block matrix
Recently Published Documents


TOTAL DOCUMENTS

205
(FIVE YEARS 53)

H-INDEX

16
(FIVE YEARS 3)

2022 ◽  
Vol 8 ◽  
pp. e843
Author(s):  
Murat Hacimurtazaoglu ◽  
Kemal Tutuncu

Background In terms of data-hiding areas, video steganography is more advantageous compared to other steganography techniques since it uses video as its cover medium. For any video steganography, the good trade-off among robustness, imperceptibility, and payload must be created and maintained. Even though it has the advantage of capacity, video steganography has the robustness problem especially regarding spatial domain is used to implement it. Transformation operations and statistical attacks can harm secret data. Thus, the ideal video steganography technique must provide high imperceptibility, high payload, and resistance towards visual, statistical and transformation-based steganalysis attacks. Methods One of the most common spatial methods for hiding data within the cover medium is the Least Significant Bit (LSB) method. In this study, an LSB-based video steganography application that uses a poly-pattern key block matrix (KBM) as the key was proposed. The key is a 64 × 64 pixel block matrix that consists of 16 sub-pattern blocks with a pixel size of 16 × 16. To increase the security of the proposed approach, sub-patterns in the KBM are allowed to shift in four directions and rotate up to 270° depending on the user preference and logical operations. For additional security XOR and AND logical operations were used to determine whether to choose the next predetermined 64 × 64 pixel block or jump to another pixel block in the cover video frame to place a KBM to embed the secret data. The fact that the combination of variable KBM structure and logical operator for the secret data embedding distinguishes the proposed algorithm from previous video steganography studies conducted with LSB-based approaches. Results Mean Squared Error (MSE), Structural Similarity Index (SSIM) and Peak Signal-to-Noise Ratio (PSNR) parameters were calculated for the detection of the imperceptibility (or the resistance against visual attacks ) of the proposed algorithm. The proposed algorithm obtained the best MSE, SSIM and PSNR parameter values based on the secret message length as 0.00066, 0.99999, 80.01458 dB for 42.8 Kb of secret message and 0.00173, 0.99999, 75.72723 dB for 109 Kb of secret message, respectively. These results are better than the results of classic LSB and the studies conducted with LSB-based video steganography approaches in the literature. Since the proposed system allows an equal amount of data embedding in each video frame the data loss will be less in transformation operations. The lost data can be easily obtained from the entire text with natural language processing. The variable structure of the KBM, logical operators and extra security preventions makes the proposed system be more secure and complex. This increases the unpredictability and resistance against statistical attacks. Thus, the proposed method provides high imperceptibility and resistance towards visual, statistical and transformation-based attacks while acceptable even high payload.


2021 ◽  
Vol 13 (2) ◽  
pp. 56-61
Author(s):  
Iwan Setiawan ◽  
Akbari Indra Basuki ◽  
Didi Rosiyadi

High performance computing (HPC) is required for image processing especially for picture element (pixel) with huge size. To avoid dependence to HPC equipment which is very expensive to be provided, the soft approach has been performed in this work. Actually, both hard and soft methods offer similar goal which are to reach time computation as short as possible. The discrete cosine transformation (DCT) and singular values decomposition (SVD) are conventionally performed to original image by consider it as a single matrix. This will result in computational burden for images with huge pixel. To overcome this problem, the second order matrix has been performed as block matrix to be applied on the original image which delivers the DCT-SVD hybrid formula. Hybrid here means the only required parameter shown in formula is intensity of the original pixel as the DCT and SVD formula has been merged in derivation. Result shows that when using Lena as original image, time computation of the singular values using the hybrid formula is almost two seconds faster than the conventional. Instead of pushing hard to provide the equipment, it is possible to overcome computational problem due to the size simply by using the proposed formula.


Author(s):  
Chao Zhang ◽  
Mingxiang Ling ◽  
Meng Tao

Abstract This paper puts forward a computationally-efficient parallel precise integration algorithm for solving vibration response subjected to time-variable excitation and nonlinearity, especially for non-homogenous dynamic response solution with large-scale degree of freedom. In detail, both of the nonlinear parts and time-varying inputs of the dynamic system are separated from the original dynamic equations and then simulated by employing a piecewise interpolation function within a computing time-step. A novel closed-form iteration formula is presented in conjunction with the block matrix strategy and modified increment-dimensional precise integration technique. Interestingly, the presented approach is essentially a high-accuracy and parallel algorithm, which exhibits a high prediction accuracy without the limitation of matrix inversion, higher-order derivative, periodicity requirement nor cycle oscillation and instability of high-order interpolation. At last, the feasibility and advantage of the proposed method is verified with two numerical examples.


2021 ◽  
pp. 303-312
Author(s):  
Irina Buslaeva ◽  
Lena Yakovleva

2021 ◽  
Vol 4 (1) ◽  
pp. 55
Author(s):  
Diny Melsye Nurul Fajri ◽  
Wayan Firdaus Mahmudy ◽  
Titiek Yulianti

One of the advantages of Kenaf fiber as an environmental management product that is currently in the center of attention is the use of Kenaf fiber for luxury car interiors with environmentally friendly plastic materials. The opportunity to export Kenaf fiber raw material will provide significant benefits, especially in the agricultural sector in Indonesia. However, there are problems in several areas of Kenaf's garden, namely plants that are attacked by diseases and pests, which cause reduced yields and even death. This problem is caused by the lack of expertise and working hours of extension workers as well as farmers' knowledge about Kenaf plants which have a terrible effect on Kenaf plants. The development of information technology can be overcome by imparting knowledge into machines known as artificial intelligence. In this study, the Convolutional Neural Network method was applied, which aims to identify symptoms and provide information about disease symptoms in Kenaf plants based on images so that early control of plant diseases can be carried out. Data processing trained directly from kenaf plantations obtained an accuracy of 57.56% for the first two classes of introduction to the VGGNet19 architecture and 25.37% for the four classes of the second introduction to the VGGNet19 architecture. The 5×5 block matrix input feature has been added in training to get maximum results.


2021 ◽  
Vol 402 ◽  
pp. 126121
Author(s):  
Mohammed Al Mugahwi ◽  
Omar De La Cruz Cabrera ◽  
Caterina Fenu ◽  
Lothar Reichel ◽  
Giuseppe Rodriguez

2021 ◽  
Vol 94 ◽  
pp. 780-790
Author(s):  
Biliang Cheng ◽  
Huping Mao ◽  
Quan Sun ◽  
Feng Jia ◽  
Peng Zhang

Sign in / Sign up

Export Citation Format

Share Document