Information security is considered as one of the important issues in the information age used to preserve the secret information through out transmissions in practical applications. With regard to image encryption, a lot of schemes related to information security were applied. Such approaches might be categorized into 2 domains; domain frequency and domain spatial. The presented work develops an encryption technique on the basis of conventional watermarking system with the use of singular value decomposition (SVD), discrete cosine transform (DCT), and discrete wavelet transform (DWT) together, the suggested DWT-DCT-SVD method has high robustness in comparison to the other conventional approaches and enhanced approach for having high robustness against Gaussian noise attacks with using denoising approach according to DWT. MSE in addition to the peak signal-to-noise ratio (PSNR) specified the performance measures which are the base of this study’s results, as they are showing that the algorithm utilized in this study has high robustness against Gaussian noise attacks.
RTL Implementation of image compression techniques in WSNIJECEIAES
The Wireless sensor networks have limitations regarding data redundancy, power and require high bandwidth when used for multimedia data. Image compression methods overcome these problems. Non-negative Matrix Factorization (NMF) method is useful in approximating high dimensional data where the data has non-negative components. Another method of the NMF called (PNMF) Projective Nonnegative Matrix Factorization is used for learning spatially localized visual patterns. Simulation results show the comparison between SVD, NMF, PNMF compression schemes. Compressed images are transmitted from base station to cluster head node and received from ordinary nodes. The station takes on the image restoration. Image quality, compression ratio, signal to noise ratio and energy consumption are the essential metrics measured for compression performance. In this paper, the compression methods are designed using Matlab.The parameters like PSNR, the total node energy consumption are calculated. RTL schematic of NMF SVD, PNMF methods is generated by using Verilog HDL.
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
RTL Implementation of image compression techniques in WSNIJECEIAES
The Wireless sensor networks have limitations regarding data redundancy, power and require high bandwidth when used for multimedia data. Image compression methods overcome these problems. Non-negative Matrix Factorization (NMF) method is useful in approximating high dimensional data where the data has non-negative components. Another method of the NMF called (PNMF) Projective Nonnegative Matrix Factorization is used for learning spatially localized visual patterns. Simulation results show the comparison between SVD, NMF, PNMF compression schemes. Compressed images are transmitted from base station to cluster head node and received from ordinary nodes. The station takes on the image restoration. Image quality, compression ratio, signal to noise ratio and energy consumption are the essential metrics measured for compression performance. In this paper, the compression methods are designed using Matlab.The parameters like PSNR, the total node energy consumption are calculated. RTL schematic of NMF SVD, PNMF methods is generated by using Verilog HDL.
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Algorithm for Watermarking and Image Encryption cscpconf
Digital watermarking is a method of copyright protection of audio, images, video and text. We
propose a new robust watermarking technique based on contourlet transform and singular value
decomposition. The paper also proposes a novel encryption algorithm to store a signed double
matrix as an RGB image. The entropy of the watermarked image and correlation coefficient of
extracted watermark image is very close to ideal values, proving the correctness of proposed
algorithm. Also experimental results show resiliency of the scheme against large blurring attack
like mean and gaussian filtering, linear filtering (high pass and low pass filtering) , non-linear
filtering (median filtering), addition of a constant offset to the pixel values and local exchange of pixels .Thus proving the security, effectiveness and robustness of the proposed watermarking algorithm.
Adaptive lifting based image compression scheme using interactive artificial ...csandit
This paper presents image compression method using Interactive Artificial Bee Colony (IABC) optimization algorithm. The proposed method reduces storage and facilitates data transmission by reducing transmission costs. To get the finest quality of compressed image, utilizing local search, IABC determines different update coefficient, and the best update coefficient is chosen
optimally. By using local search in the update step, we alter the center pixels with the coefficient in 8-different directions with a considerable window size, to produce the compressed image, expressed in terms of both PSNR and compression ratio. The IABC brings in the idea of
universal gravitation into the consideration of the affection between onlooker bees and the employed bees. By passing on different values of the control parameter, the universal gravitation involved in the IABC has various quantities of the single onlooker bee and employed bees. As a result when compared to existing methods, the proposed work gives better PSNR.
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...VLSICS Design
This paper presents the architecture and VHDL design of a Two Dimensional Discrete Cosine Transform (2D-DCT) with Quantization and zigzag arrangement. This architecture is used as the core and path in JPEG image compression hardware. The 2D- DCT calculation is made using the 2D- DCT Separability property, such that the whole architecture is divided into two 1D-DCT calculations by using a transpose buffer. Architecture for Quantization and zigzag process is also described in this paper. The quantization process is done using division operation. This design aimed to be implemented in Spartan-3E XC3S500 FPGA. The 2D- DCT architecture uses 1891 Slices, 51I/O pins, and 8 multipliers of one Xilinx Spartan-3E XC3S500E FPGA reaches an operating frequency of 101.35 MHz One input block with 8 x 8 elements of 8 bits each is processed in 6604 ns and pipeline latency is 140 clock cycles .
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
This project presents a new image compression technique for the coding of retinal and
fingerprint images. Retinal images are used to detect diseases like diabetes or
hypertension. Fingerprint images are used for the security purpose. In this work, the
contourlet transform of the retinal and fingerprint image is taken first. The coefficients of
the contourlet transform are quantized using adaptive multistage vector quantization
scheme. The number of code vectors in the adaptive vector quantization scheme depends
on the dynamic range of the input image.
A novel rrw framework to resist accidental attackseSAT Journals
Abstract Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. Robust reversible watermarking (RRW) is used to protect the copyrights and providing robustness against unintentional attacks. The past histogram rotation-based methods suffer from extremely poor invisibility for watermarked images and limited robustness in extracting watermarks from the watermarked images destroyed by unintentional attacks. This paper proposes a wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC) method and Enhanced pixel-wise masking (EPWM). This method embeds a new watermark image and extraction procedures by histogram shifting and clustering, which are important for improving robustness and reducing run-time complexity. It is possible reversibility and invisibility. By using WSQH-SC methods reversibility, invisibility of watermarks can be achieved. The experimental results show the comprehensive performance in terms of reversibility, robustness, invisibility, capacity and run-time complexity widely applicable to different kinds of images. Keywords: — Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW)
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATIONijma
Techniques for conversion of natural video scenes into drawing-style videos are frequently used to produce animated movies. In the past, the conversion was manually performed, what demanded a lot of time and a high production cost. Recently, with the advancement of computer vision techniques and the development of new deep learning algorithms, drawing' can be automatically performed. Nevertheless, current`drawing' algorithms are computationally expensive and require a high processing time. In this letter, we present a simple, but effective `drawing' algorithm that is capable of reducing the processing time.
Image fusion is an image enhancement approach for increasing the visual perception from two or more image into a single image. Each image is obtained from different object in focus. This process is now broadly used in various application of image processing such as medical imaging such as MRI, CT [18] and PET, remote sensing, satellite imaging, in design of intelligent robot etc. In this paper we have gone through the literature work done by the various researchers to obtain high quality improved image by combining important and desirable features from two or more images into a single image. Different image fusion rules, like maximum selection scheme, weighted average scheme and window based verification scheme are discussed. We also discuss about the image fusion techniques using DWT. Distinct blurred images are fused using DWT, SWT and using local correlation and their results are compared. The role of fusion in image enhancement is also taken into consideration. The results of different fusion technique are also compared, which are furnished in pictures and tables.
A Review on Image Compression using DCT and DWTIJSRD
Image Compression addresses the matter of reducing the amount of data needed to represent the digital image. There are several transformation techniques used for data compression. Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) is mostly used transformation. The Discrete cosine transform (DCT) is a method for transform an image from spatial domain to frequency domain. DCT has high energy compaction property and requires less computational resources. On the other hand, DWT is multi resolution transformation. The research paper includes various approaches that have been used by different researchers for Image Compression. The analysis has been carried out in terms of performance parameters Peak signal to noise ratio, Bit error rate, Compression ratio, Mean square error. and time taken for decomposition and reconstruction.
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScsitconf
Segmentation of Synthetic Aperture Radar (SAR) images have a great use in observing the
global environment, and in analysing the target detection and recognition .But , segmentation
of (SAR) images is known as a very complex task, due to the existence of speckle noise.
Therefore, in this paper we present a fast SAR images segmentation based on between class
variance. Our choice for used (BCV) method, because it is one of the most effective thresholding
techniques for most real world images with regard to uniformity and shape measures. Our
experiments will be as a test to determine which technique is effective in thresholding
(extraction) the oil spill for numerous SAR images, and in the future these thresholding
techniques can be very useful in detection objects in other SAR images
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A Novel Algorithm for Watermarking and Image Encryption cscpconf
Digital watermarking is a method of copyright protection of audio, images, video and text. We
propose a new robust watermarking technique based on contourlet transform and singular value
decomposition. The paper also proposes a novel encryption algorithm to store a signed double
matrix as an RGB image. The entropy of the watermarked image and correlation coefficient of
extracted watermark image is very close to ideal values, proving the correctness of proposed
algorithm. Also experimental results show resiliency of the scheme against large blurring attack
like mean and gaussian filtering, linear filtering (high pass and low pass filtering) , non-linear
filtering (median filtering), addition of a constant offset to the pixel values and local exchange of pixels .Thus proving the security, effectiveness and robustness of the proposed watermarking algorithm.
Adaptive lifting based image compression scheme using interactive artificial ...csandit
This paper presents image compression method using Interactive Artificial Bee Colony (IABC) optimization algorithm. The proposed method reduces storage and facilitates data transmission by reducing transmission costs. To get the finest quality of compressed image, utilizing local search, IABC determines different update coefficient, and the best update coefficient is chosen
optimally. By using local search in the update step, we alter the center pixels with the coefficient in 8-different directions with a considerable window size, to produce the compressed image, expressed in terms of both PSNR and compression ratio. The IABC brings in the idea of
universal gravitation into the consideration of the affection between onlooker bees and the employed bees. By passing on different values of the control parameter, the universal gravitation involved in the IABC has various quantities of the single onlooker bee and employed bees. As a result when compared to existing methods, the proposed work gives better PSNR.
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...VLSICS Design
This paper presents the architecture and VHDL design of a Two Dimensional Discrete Cosine Transform (2D-DCT) with Quantization and zigzag arrangement. This architecture is used as the core and path in JPEG image compression hardware. The 2D- DCT calculation is made using the 2D- DCT Separability property, such that the whole architecture is divided into two 1D-DCT calculations by using a transpose buffer. Architecture for Quantization and zigzag process is also described in this paper. The quantization process is done using division operation. This design aimed to be implemented in Spartan-3E XC3S500 FPGA. The 2D- DCT architecture uses 1891 Slices, 51I/O pins, and 8 multipliers of one Xilinx Spartan-3E XC3S500E FPGA reaches an operating frequency of 101.35 MHz One input block with 8 x 8 elements of 8 bits each is processed in 6604 ns and pipeline latency is 140 clock cycles .
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
This project presents a new image compression technique for the coding of retinal and
fingerprint images. Retinal images are used to detect diseases like diabetes or
hypertension. Fingerprint images are used for the security purpose. In this work, the
contourlet transform of the retinal and fingerprint image is taken first. The coefficients of
the contourlet transform are quantized using adaptive multistage vector quantization
scheme. The number of code vectors in the adaptive vector quantization scheme depends
on the dynamic range of the input image.
A novel rrw framework to resist accidental attackseSAT Journals
Abstract Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. Robust reversible watermarking (RRW) is used to protect the copyrights and providing robustness against unintentional attacks. The past histogram rotation-based methods suffer from extremely poor invisibility for watermarked images and limited robustness in extracting watermarks from the watermarked images destroyed by unintentional attacks. This paper proposes a wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC) method and Enhanced pixel-wise masking (EPWM). This method embeds a new watermark image and extraction procedures by histogram shifting and clustering, which are important for improving robustness and reducing run-time complexity. It is possible reversibility and invisibility. By using WSQH-SC methods reversibility, invisibility of watermarks can be achieved. The experimental results show the comprehensive performance in terms of reversibility, robustness, invisibility, capacity and run-time complexity widely applicable to different kinds of images. Keywords: — Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW)
FAST VIDEO ARTISTIC TRANSFER VIA MOTION COMPENSATIONijma
Techniques for conversion of natural video scenes into drawing-style videos are frequently used to produce animated movies. In the past, the conversion was manually performed, what demanded a lot of time and a high production cost. Recently, with the advancement of computer vision techniques and the development of new deep learning algorithms, drawing' can be automatically performed. Nevertheless, current`drawing' algorithms are computationally expensive and require a high processing time. In this letter, we present a simple, but effective `drawing' algorithm that is capable of reducing the processing time.
Image fusion is an image enhancement approach for increasing the visual perception from two or more image into a single image. Each image is obtained from different object in focus. This process is now broadly used in various application of image processing such as medical imaging such as MRI, CT [18] and PET, remote sensing, satellite imaging, in design of intelligent robot etc. In this paper we have gone through the literature work done by the various researchers to obtain high quality improved image by combining important and desirable features from two or more images into a single image. Different image fusion rules, like maximum selection scheme, weighted average scheme and window based verification scheme are discussed. We also discuss about the image fusion techniques using DWT. Distinct blurred images are fused using DWT, SWT and using local correlation and their results are compared. The role of fusion in image enhancement is also taken into consideration. The results of different fusion technique are also compared, which are furnished in pictures and tables.
A Review on Image Compression using DCT and DWTIJSRD
Image Compression addresses the matter of reducing the amount of data needed to represent the digital image. There are several transformation techniques used for data compression. Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) is mostly used transformation. The Discrete cosine transform (DCT) is a method for transform an image from spatial domain to frequency domain. DCT has high energy compaction property and requires less computational resources. On the other hand, DWT is multi resolution transformation. The research paper includes various approaches that have been used by different researchers for Image Compression. The analysis has been carried out in terms of performance parameters Peak signal to noise ratio, Bit error rate, Compression ratio, Mean square error. and time taken for decomposition and reconstruction.
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGEScsitconf
Segmentation of Synthetic Aperture Radar (SAR) images have a great use in observing the
global environment, and in analysing the target detection and recognition .But , segmentation
of (SAR) images is known as a very complex task, due to the existence of speckle noise.
Therefore, in this paper we present a fast SAR images segmentation based on between class
variance. Our choice for used (BCV) method, because it is one of the most effective thresholding
techniques for most real world images with regard to uniformity and shape measures. Our
experiments will be as a test to determine which technique is effective in thresholding
(extraction) the oil spill for numerous SAR images, and in the future these thresholding
techniques can be very useful in detection objects in other SAR images
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
We present a new image compression method to improve visual perception of the decompressed images and achieve higher image compression ratio. This method balances between the compression rate and image quality by compressing the essential parts of the image-edges. The key subject/edge is of more significance than background/non-edge image. Taking into consideration the value of image components and the effect of smoothness in image compression, this method classifies the image components as edge or non-edge. Low-quality lossy compression is applied to non-edge components whereas high-quality lossy compression is applied to edge components. Outcomes show that our suggested method is efficient in terms of compression ratio, bits per-pixel and peak signal to noise ratio.
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
Multimedia security has been the aim point of considerable research activity because of its wide
application area. The major technology to achieve copyright protection, content authentication,
access control and multimedia security is watermarking which is the process of embedding data
into a multimedia element such as image or audio, this embedded data can later be extracted
from, or detected in the embedded element for different purposes. In this work, a blind
watermarking algorithm based on SVD and circulant matrices has been presented. Every
circulant matrix is associated with a matrix for which the SVD decomposition coincides with the
spectral decomposition. This leads to improve the Chandra algorithm [1], our presentation will
include a discussion on the data hiding capacity, watermark transparency and robustness
against a wide range of common image processing attacks.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Near Reversible Data Hiding Scheme for images using DCTIJERA Editor
Certain level of modifications to the original content can be acceptable. These schemes are called nearreversible.
It has emerging application in remote sensing. In remote sensing application the image is captured
while monitoring the damaged regions in the natural disasters such as tsunami, volcanic eruption, etc. Instead of
more alterations to the pixels or coefficients here we go for less alterations , low hiding capacity and
complexity that exhibit while reversible data hiding. There exist a few near reversible hiding schemes which
address the limitations to the triangular trade-off that exists between capacity, robustness and visual quality
characteristics. However, for achieving better vision of image, there is a need for near reversible data hiding
schemes. Therefore, the traditional metric
PSNR are not sufficient to assess the distorted image when the data is embedded in image for assessing the
better visual quality of the image with hidden data we present a HVS based metrics like PSNR-HVS, MSSIM.
Using DCT evaluates the overall image quality
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
In this paper a watermarking method using hybrid wavelet transform and SVD is proposed. Hybrid wavelet transform generated from two different orthogonal transforms is applied on host and SVD is applied to watermark. The transforms used for hybrid wavelet transform generation are DCT, Walsh, Haar and DKT. First component transform used in generation of hybrid wavelet transform corresponds to global properties and second component transform corresponds to local properties of an image to which
transform are applied. Aim of proposed watermarking method is to study effect of selecting DCT as
global/local component transform on robustness. After testing the proposed method against various
attacks, using DCT as global component is observed to be robust against compression, resizing using
transforms, resizing using grid based interpolation and noise addition attacks. DCT when used as local
component is observed to be robust against cropping. It also shows robustness against resizing using
transforms, resizing using grid based interpolation and noise addition attacks.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Improved anti-noise attack ability of image encryption algorithm using de-noising technique
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 6, December 2020, pp. 3080~3087
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i6.16384 3080
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Improved anti-noise attack ability of image encryption
algorithm using de-noising technique
Mohanad Najm Abdulwahed, Ali kamil Ahmed
Department of Materials, University of Technology, Iraq
Article Info ABSTRACT
Article history:
Received Apr 4, 2020
Revised May 18, 2020
Accepted Jun 25, 2020
Information security is considered as one of the important issues in the
information age used to preserve the secret information throughout transmissions
in practical applications. With regard to image encryption, a lot of schemes
related to information security were applied. Such approaches might be
categorized into 2 domains; domain frequency and domain spatial. The presented
work develops an encryption technique on the basis of conventional
watermarking system with the use of singular value decomposition (SVD),
discrete cosine transform (DCT), and discrete wavelet transform (DWT)
together, the suggested DWT-DCT-SVD method has high robustness in
comparison to the other conventional approaches and enhanced approach for
having high robustness against Gaussian noise attacks with using denoising
approach according to DWT. Mean square error (MSE) in addition to the peak
signal-to-noise ratio (PSNR) specified the performance measures which are the
base of this study’s results, as they are showing that the algorithm utilized in this
study has high robustness against Gaussian noise attacks.
Keywords:
DCT
DWT
Gaussian noise
Image encryption
Image processing
SVD
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mohanad Najm Abdulwahed
Department of Materials,
University of Technology,
Baghdad, Iraq.
Email: mohanad.najm@yahoo.com
1. INTRODUCTION
Image processing is defined as certain mathematical operations with the use of signal processing,
where the input might be image, picture, image collection, video or photo frame, while image processing’s
output might be image or set of image-associated parameters or features [1-3]. A lot of image processing
approaches involves view the images as two-dimesional (2D) signal as well as utilizing standard approaches
for signal processing. The image encryption methods might be categorized into 2 groups on the basis of
frequency domain and spatial domain operations [4]. The latter work in spatial domain, encrypted artifacts
have been the intensity and position of pixels, whereas the former is in frequency domain is frequency
coefficients. The earlier encryption approaches are operating in spatial domain. The techniques related to
spatial domain image-encryption are requiring a lot of computations [5].
Generally, some transformation approaches including discrete wavelet transform (DWT) and discrete
cosine transform (DCT) have been utilized in the approaches of image encryption on the basis of transform
domain. In comparison to conventional discrete Fourier transform (DFT), the DCT is avoiding complex
computations, also the DWT might be obtaining strong input image localization features in frequency and
spatial domain. The drawbacks of double random phase encryption (DRPE) are recognized, also it is indicated
that the digital watermarking has increased robustness in frequency domain, also it might be exploiting the
2. TELKOMNIKA Telecommun Comput El Control
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3081
benefits of transform approaches [4]. The major workflow regarding digital watermarking has been close to
decryption and encryption of image in which it is hiding original (secret) image to the host image. Specifying
the efficiency of image encryption approaches has been of high important with the use of digital watermarking
methods [6]. It has been indicated that the strategies of image denoising might be filtering out the image noises
throughout image’s pre-processing; in the case when such approach might be utilized in developing approaches
of image encryption, anti-attack capability of such approach against the noise attacks is going to be enhanced;
furthermore, robustness regarding such approach is going to be enhanced [7, 8].
The presented study develops DWT-DCT-SVD (singular value decomposition) based approach of the
image encryption according to digital watermarking approaches; the results are showing that the developed
approach has the ability for resisting the majority of attacks; the effectiveness of the suggested scheme has
been however inacceptable in terms of Gaussian noise attacks. Therefore, the study will specify utilizing the
image denoising for boosting anti-attack ability against the noise attacks.
2. SINGULAR VALUE DECOMPOSITION (SVD)
SVD can be defined as matrix transformation approach that depends on the eigenvalue. Each one of
the images could be provided as matrix, SVD might be decomposing the matrix to sum of various matrices.
Also, SVD isn’t associated to transformation between frequency and spatial domain, yet image’s singular value
has excellent stability; also, it is typically combining with the transform algorithms in the field of image
processing. In the case when disturbances are applied to an image, singular value won’t be too much modified.
Also, matrix’s singular vector has invariance in terms of rotation, translation, and so on. Thus, singular value
might efficiently reflect the matrix’s properties. In the case when being utilized to image’s matrix, singular
value in addition to its spanned vector space regarding the image might be reflecting various features and
components of image. Image’s algebraic characteristics might be specified, also SVD has been majorly utilized
in the image processing. Due to its rotation invariance and stability, the majority of present algorithms of image
encryption have been on the basis of SVD that have elevated robustness [9-11]. An excellent approach for
computing eigenvectors and eigenvalues of data matrix X (KxM) has been with the use of SVD specified as
follows [12]:
𝑋 = [
𝑥1 𝑥2 … … … … 𝑥 𝑀
𝑥 𝑀+1 𝑥 𝑀+2 … … … 𝑥2𝑀
𝑥(𝐾−1)𝑀+1 𝑥(𝐾−1)𝑀+2……. 𝑥 𝐾𝑀
] (1)
The theorem of SVD indicating that ^xM matrix X might be decomposed to the next matrices’ product:
𝑋 = 𝑈∑𝑉∗ 𝑇
(2)
In which U representing K x K orthonormal matrix which contain left singular vectors that are arranged
column wise
𝑈 = [
1 1 … … 1
𝑢1 𝑢2 … … 𝑢 𝐾
1 1 … … 1
] (3)
V representing M x M orthonormal matrix related to the right singular vectors,
𝑉 = [
1 1 … … 1
𝑣1 𝑣2 … … 𝑣 𝐾
1 1 … … 1
] (4)
while ∑ representing K xM matrix regarding the nonnegative real singular values:
∑ =
[
𝜎1 0 0
0 𝜎2 0
. . . .
. . . .
. . . .
0 0 𝜎 𝑀
0 0 0
. . . .
. . . .
. . . .
0 0 0 ]
(5)
3. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087
3082
Due to such SVD’s properties, in the past two years, some watermarking calculations were suggested
with regard to such system. The major concept of such approach has been discovering the cover image’s SVD
and then changing its solitary qualities for installing watermark. A few of the SVD-based calculations have
been specified as SVD-situated, it might be indicated that the lone SVD area has been applied for implanting
watermark to picture. Recently, a few of half and half SVD-based calculations were suggested, in which
the different types of changes space involving DCT, DWT, and fast Hadamard transform. were used for
inserting the watermark to picture [13].
3. DCT TRANSFORM
This approach has solid energy concentration properties in the low frequency part following a
transform. Also, signal’s statistical characteristics has been close to the process of Markov, DCT’s
de-correlated performance has been close to the performance regarding K-L transform; the latter provided
optimum de-correlated performance, thus DCT has been majorly utilized in the image processing like image
encryption and image compression. In comparison to DFT, computations in the DCT have been in the real
domain, eliminating the complex operations as well as enhancing speed. Also, DCT has rotation, translation,
and scaling invariance related to Fourier transform that might be efficiently resisting the geometric attacks.
Due to such benefits, DCT has excellent performance in image encryption field and was utilized recently in a
lot of studies [13, 14].
Changes in discrete cosine has been a process to change flag to rudimentary recurrence parts. Also, it
is dealing with the picture as entirety of sinusoids related to frequencies and fluctuating extents. With regard
to the information picture, x, the DCT coefficients for changed yield picture, y, have been processed as shown
in (5). Furthermore, x, representing info imagehaving N x M pixels, x(m,n) has been pixel’s power in push m,
also segment n related to picture, y(u,v) representing DCT coefficient in the push u, while the section v of DCT
network [15, 16].
𝑦(𝑢, 𝑣) = √
2
𝑀
√
2
𝑁
𝛼 𝑢 𝛼 𝑣 ∑ ∑ 𝑥(𝑚, 𝑛) cos
(2𝑚 + 1)𝑢𝜋
2𝑀
𝑁−1
𝑣=0
𝑀−1
𝑢=0
cos
(2𝑛 + 1)𝑣𝜋
2𝑁
(6)
An image has been re-constructed via using the inverse DCT operation as show in (6):
𝑥(𝑚, 𝑛) = √
2
𝑀
√
2
𝑁
∑ ∑ 𝛼 𝑢 𝛼 𝑣 𝑦(𝑢, 𝑣) cos
(2𝑚 + 1)𝑢𝜋
2𝑀
𝑁−1
𝑣=0
𝑀−1
𝑢=0
cos
(2𝑛 + 1)𝑣𝜋
2𝑁
(7)
4. DISCRETE WAVELET TRANSFORM (DWT)
The wavelets have been utilized in image processing for compression, watermarking, sample edge
detection, coding and denoising of the interesting features with regard to subsequent classification. The next
sub-sections are discussing the denoising of image through thresholding DWT coefficients [17-20].
4.1. DWT of image data
Images are provided as 2D coefficients’ array. Each one of the coefficients are representing that
point’s brightness degree. The majority of the herbal photographs are showing the smooth coloration variations
with optimum details representing sharp edges from simple versions. The clean variations in coloration might
be labelled as low-frequency versions, in which the pointy variations might be labelled as excessive-frequency
versions. Also, low-frequency components (for instance, smooth versions) are showing the photographs’ base,
in which excessive-frequency components (for instance edges providing the details) have been uploaded upon
low-frequency components for refining the image, thus creating in-depth images. Also, the easy versions have
been significant in comparison to details. A lot of approaches might be utilized for differentiating between
the photograph information and easy variations. An example of such approaches has been picture
decomposition through DWT re-modeling. Various levels of de-composition related to DWT can be seen in
the Figure 1.
4.2. Image’s inverse DWT
Various data classes have been collected to re-constructed image with the use of reverse wavelet
transform. Also, pair of the low and high-pass filters have been utilized throughout the process of
re-construction. The filters have been indicated to as synthesis filter pair. The process of filtering has been
4. TELKOMNIKA Telecommun Comput El Control
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3083
the opposite of transformation; the process is starting from highest level. Furthermore, filters have been initially
utilized column-wise, after that row-wise level by level till reaching lowest level.
(a) (b) (c)
Figure 1. DWT Decomposition levels; (a) single level decomposition, (b) two level decomposition,
(c) three level decomposition
5. STRATEGIES OF IMAGE DENOISING UTILIZING DWT
With regard to digital image processing, images are sometimes attacked via different noises and
the image’s quality is going to be reduced; if the image noise might be efficiently filtered out or not, it is going
to be affecting subsequent processing like image decryption, edge detection, object segmentation, and feature
extraction [21, 22]. With regard to digital image processing, images are sometimes attacked via different noises
and the image’s quality is going to be reduced; if the image noise might be efficiently filtered out or not, it is
going to be affecting subsequent processing like image decryption, edge detection, object segmentation, and
feature extraction [21, 22]. The next phases are describing the process of image denoising.
- DWT related to a noisy image will be estimated.
- After the DWT representation done, de-noising is done using soft-thresholding by modified universal
threshold estimation (MUTE). Providing ambient noise is a colored, a threshold dependent on level applied
to each level of frequency was proposed in [7, 23]. The value of threshold applied to the coefficients of
estimated time-frequency using MUTE [23] is expressed as:
𝜆 𝑘 = 𝑐. 𝜎 𝑣,𝑘√2log (𝑁) (8)
where N is length of signal, 𝜎 𝑣, 𝑘 is noise estimated standard deviation for level k, and c is the (modified
universal threshold factor) 0<𝑐<1. The noise variance will be computed with the use of the next robust
median estimator:
𝜎𝑣 =
𝑚𝑒𝑑𝑖𝑎𝑛(|𝑋 𝐷(𝑛, 𝑘)|)
0.6745
(9)
In which 𝑋 𝐷(𝑛, 𝑘) representing all coefficients related to wavelet details in level k [24].
- Soft threshold will be utilized to sub-band coefficients with regard to each of the sub-bands, excluding
low-pass or approximation sub-band [25].
𝑋 𝐷,𝛾(𝑛, 𝑘) = {
𝑠𝑔𝑛(𝑋 𝐷(𝑛, 𝑘))(|𝑋 𝐷(𝑛, 𝑘)| − 𝛾 𝑘) 𝑖𝑓|𝑋 𝐷(𝑛, 𝑘)| > 𝛾 𝑘
0 𝑖𝑓|𝑋 𝐷(𝑛, 𝑘)| ≤ 𝛾 𝑘
(10)
In which 𝛾 𝑘 representing threshold value in the level k, also 𝑋 𝐷,𝛾(𝑛, 𝑘) representing wavelet detail
coefficients following the process of thresholding in level k.
- Image has been re-constructed through using inverse DWT for obtaining denoised image. Figure 2 showing
the data flow diagram related to the denoising process of an image.
5. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087
3084
Figure 2. Data flow diagram of image denoising
6. ENCRYPTION TECHNIQUES ACCORDING TO DWT-DCT-SVD THROUGH UTILIZING
DENOISING APPROACHES USING DWT
On the basis of the presented DWT-DCT-SVD encryption techniques with the use of normal image
as host image, using the approaches of denoising prior to image decryption for enhancing the anti-attack
capability related to such approach against noise attacks. Also, new workflow has been shown in the Figure 3.
According to the Figure 3, the processes of encryption and decryption might be provided in the following way:
- Step 1: Selecting original and host images of same size;
- Step 2: Utilizing DWT to the two image, also getting 4 sub-bands for each one of the images; following
utilizing DCT on the sub-bands, applying SVD for each one of the sub-bands and composed the coincident
sub-bands towards original and host images; after that, applying the inverse-DWT as well as the inverse-DCT
for getting encrypted image, such process might be treated as DWT-DCT-SVD encryption approach;
- Step 3: Through the encrypted image’s transmission, it might be attacked through the noising attacks; using
conventional denoising approaches or the linear CNN model-based approach for filtering attacked
encrypted image;
- Step 4: Encrypted image is going to be decrypted, also the process of decryption is going to be handled as
encryption’s inverse procedure; after that, getting the decrypted image.
Figure 3. Suggested model
7. PERFORMANCE MEASURES
The common measurement parameters with regard to the reliability of image involves mean absolute
error, normalized mean square error (NMSE), mean square error (MSE), and peak signal-to-noise ratio
(PSNR). SNR over 40 dB offers optimum quality of the image which is close to original image; SNR with
30-40 dB generally producing excellent quality of the image with adequate distortions; SNR with 20-30 dB
presenting bad quality of the image; SNR not more than 20 dB generating undesirable image [26]. Furthermore,
the calculation approaches for NMSE and PSNR [27] have been provided in the following way:
(11)
In which MSE representing MSE between original image (𝑥) as well as denoised image (𝑥̂) with size M×N:
(12)
6. TELKOMNIKA Telecommun Comput El Control
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3085
8. RESULTS AND DISCUSSIONS
This study utilized 2 distinctive algorithms with regard to digital image’s watermarking, also for each
one of the schemes, there are 3 types of results as follows:
- The image watermarking/dewater marking with no image attack.
- The image watermarking/dewater marking with the Gaussian noise image attack.
With regard to all the sets of images, there have been 3 results related to each algorithm. The recover
image’s quality has been estimated via MSE and PSNR. High PSNR values representing higher quality related
to the recover image because of small errors in the algorithm of image extraction. Also, the MSE near zeros is
the similarity measure between 2 images. The study selected image camerman for showing the results.
Decrypted and encrypted images can be seen in Figure 4. According to the results, it can be seen that
the encrypted image has been comparable to host image. Put differently, secret image’s information was
successfully hidden in encrypted image. With regard to the decrypted image, it can be indicated that the secret
image’s details are visible, also specifying that all the 4 results are meeting the expectations, also the encryption
approach on the basis of DWT-DCT-SVD system is of adequate performance.
(a) (b)
(c) (d)
Figure 4. Results for algorithm one image encryption with no noise attack;
(a) host image, (b) original image, (c) encrypted image, (d) decrypted image
The study utilized the DCT-DWT-SVD noise algorithm on the host image for watermarking original
image. After that, the Gaussian image with the variance attacks has been applied to the watermark image, also
it has been dewater marked and the extracted watermarked image can be seen in the Figure 5. Table 1, showing
the suggested method’s performance on the noise power with variance 0.1 on the basis of Daubechies wavelet
biases in comparison to the case with no noise attack. The values of MSE and PSNR have been estimated
according to noise power value.
Table 1. Performance on the noise power with variance 0.1 on the basis of Daubechies wavelet biases in
comparison to the case with no noise attack
Case PSNR MSE
No Attack 212 0.00
3 42.30 0.008
7. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 3080 - 3087
3086
(a) (b) (c)
(d) (e) (f)
Figure 5. Image encryption results with the Gaussian noise attack;
(a) host image, (b) original image, (c) encrypted image, (d) gaussian noise encrypted image,
(e) encrypted image after denoising, (f) decrypted image denoising
9. CONCLUSIONS
The results of this study are suggesting that the DCT-DWT-SVD based watermarking approach as
well as the denoising algorithm utilizing DWT has been providing optimum performance in the existence of
watermark image’s recovery that has been attacked via Gaussian noise. Results have been analytically verified
with regard to MSE and PSNR, also the two have been high for new DCT-DWT-SVD watermarking system.
REFERENCES
[1] M. Sharkas, D. ElShafie, and N. Hamdy, "A Dual Digital-Image Watermarking Technique," The Third World
Enformatika Conference, pp. 136-139, April 2005.
[2] O. Omoruyi, et al., "Evaluation of the quality of an image encrytion scheme," TELKOMNIKA Telecommunication
Computing Electronics and Control, vol. 17, no. 6, pp. 2968-2974, December 2019.
[3] E. H. Rachmawanto, et al., "An improved security and message capacity using AES and Huffman coding on
image steganography," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 5, pp.
2400-2409, October 2019.
[4] Z. Liu, "Comparative evaluations of image encryption algorithms," Auckland University of Technology, 2018.
[5] Z. Liu, et al., "Double image encryption by using Arnold transform and discrete fractional angular transform," Optics
and Lasers in Engineering, vol. 50, no. 2, pp. 248-255, February 2012.
[6] N. Divecha and N. Jani, "Implementation and performance analysis of DCT-DWT-SVD based watermarking
algorithms for color images," 2013 International Conference on Intelligent Systems and Signal Processing (ISSP),
pp. 204-208, March 2013.
[7] Y. Y. Al-Aboosi, R. S. Issa, and A. khalid Jassim, "Image denosing in underwater acoustic noise using discrete
wavelet transform with different noise level estimation," TELKOMNIKA Telecommunication, Computing,
Electronics and Control, vol. 18, no. 3, pp. 1439-1446, June 2020.
[8] R. Thillainayagi and K. Senthil Kumar, "Combination of wavelet transform and singular value decomposition-based
contrast enhancement technique for target detection in UAV reconnaissance thermal images," Journal of Modern
Optics, vol. 66, no. 3, pp. 606-617, January 2019.
[9] N. M. Makbol, B. E. Khoo, and T. H. Rassem, "Block-based discrete wavelet transform-singular value decomposition
image watermarking scheme using human visual system characteristics," IET Image processing, vol. 10, no. 1,
pp. 34-52, 2016.
8. TELKOMNIKA Telecommun Comput El Control
Improved anti-noise attack ability of image encryption algorithm using ... (Mohanad Najm Abdulwahed)
3087
[10] A. Mansouri, A. M. Aznaveh, and F. T. Azar, "SVD-based digital image watermarking using complex wavelet
transform," Sadhana, vol. 34, no. 3, pp. 393-406, June 2009.
[11] L. Novamizanti, G. Budiman, and E. N. F. Astuti, "Robust audio watermarking based on transform domain and
SVD with compressive sampling framework," TELKOMNIKA Telecommunication, Computing, Electronics and
Control, vol. 18, no. 2, pp. 1079-1088, April 2020.
[12] Handito, Kurniawan Wira, et al., "The comparison between SVD-DCT and SVD-DWT digital image
watermarking," International Conference on Data and Information Science. IOP Conf. Series: Journal of Physics:
Conf. Series, vol. 971. 2017.
[13] Zhang, Lina, and Deyun Wei, "Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm
optimization," Multimedia Tools and Applications, vol. 78, pp. 28003-28023, 2019.
[14] L. Novamizanti, G. Budiman, and I. Safitri, "Modified DCT-based audio watermarking optimization using genetics
algorithm," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 16, no. 6, pp. 2651-2660,
December 2018.
[15] K. R. Rao and P. Yip, "Discrete cosine transform: algorithms, advantages, applications," Academic Press
Professional, August 1990.
[16] G. Budiman, L. Novamizanti, and I. Iwut, "Genetics algorithm optimization of DWT-DCT based image
Watermarking," Journal of Physics: Conference Series, vol. 795, no. 1, pp. 012039, February 2017.
[17] M. Misiti, et al., "Wavelet toolbox," The MathWorks Inc., Natick, MA, vol. 15, pp. 21, 1996.
[18] D. Gupta and S. Choubey, "Discrete wavelet transform for image processing," International Journal of Emerging
Technology and Advanced Engineering, vol. 4, pp. 598-602, 2015.
[19] D. Baleanu, "Advances in wavelet theory and their applications in engineering, physics and technology," BoD–Books
on Demand, 2012.
[20] W. S. Sari, E. H. Rachmawanto, and C. A. Sari, "A Good Performance OTP encryption image based on
DCT-DWT steganography," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 15, no. 4,
pp. 1987-1995, December 2017.
[21] M. N. Abdulwahed and A. kamil Ahmed, "Underwater image de-nosing using discrete wavelet transform and
pre-whitening filter," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 16, no. 6, pp.
2622-2629, December 2018.
[22] C. Kumar, G. Sai, R. K. Kumar, G. A. Naidu, and J. Harikiran, "Noise removal in microarray images using
variational mode decomposition technique," TELKOMNIKA Telecommunication Computing Electronics and
Control, vol. 15, no. 4, pp. 1750-1756, December 2017.
[23] D. L. Donoho, "De-noising by soft-thresholding," IEEE transactions on information theory, vol. 41, pp. 613-627, 1995.
[24] I. M. Johnstone and B. W. Silverman, "Wavelet threshold estimators for data with correlated noise," Journal of the
royal statistical society: series B (statistical methodology), vol. 59, pp. 319-351, 1997.
[25] R. Aggarwal, et al., "Noise reduction of speech signal using wavelet transform with modified universal threshold,"
International Journal of Computer Applications, vol. 20, no. 5, pp. 14-19, April 2011.
[26] C. Tan, G. Seet, A. Sluzek, and D. He, "A novel application of range-gated underwater laser imaging system (ULIS)
in near-target turbid medium," Optics and Lasers in Engineering, vol. 43, no. 9, pp. 995-1009, September 2005.
[27] J. Ellinas, T. Mandadelis, A. Tzortzis, and L. Aslanoglou, "Image de-noising using wavelets," TEI of Piraeus Applied
Research Review, vol. 9, pp. 97-109, 2004.