A study of neural-network-based classifiers for material classification

HK Lam, U Ekong, H Liu, B Xiao, H Araujo, SH Ling… - Neurocomputing, 2014 - Elsevier
In this paper, the performance of the commonly used neural-network-based classifiers is
investigated on solving a classification problem which aims to identify the object nature …

Variable weight neural networks and their applications on material surface and epilepsy seizure phase classifications

HK Lam, U Ekong, B Xiao, G Ouyang, H Liu, KY Chan… - Neurocomputing, 2015 - Elsevier
This paper presents a novel neural network having variable weights, which is able to
improve its learning and generalisation capabilities, to deal with classification problems. The …

Identification of a standard AI based technique for credit risk analysis

M Punniyamoorthy, P Sridevi - Benchmarking: An International …, 2016 - emerald.com
Purpose–Credit risk assessment has gained importance in recent years due to global
financial crisis and credit crunch. Financial institutions therefore seek the support of credit …

SVM-SS watermarking model for medical images

S Ramly, SA Aljunid, H Shaker Hussain - … DEIS 2011, London, UK, July 20 …, 2011 - Springer
To ensure the crucial integrity and confidentiality of patients' information, this paper
proposes a novel support vector machine (SVM) cum spread spectrum (SS) watermarking …

[PDF][PDF] Computerized steganographic technique using fuzzy logic

AA Alghamdi - International Journal of Advanced …, 2018 - pdfs.semanticscholar.org
Computer security in which hiding the required information is done by inserting messages
within other messages, which is a string of characters containing the useful information, in a …

Blind image steganalytic optimization by using machine learning

D Giarimpampa - 2018 - diva-portal.org
Since antiquity, steganography has existed in protecting sensitive information against
unauthorized unveiling attempts. Nevertheless, digital media's evolution, reveals that …

[PDF][PDF] Image Steganography Using Fuzzy Domain Transformation and Pixel Classification.

AK Alvi, R Dawes - SEKE, 2013 - researchgate.net
Image steganography offers many techniques to hide secret data from an eavesdropper. We
use fuzzy logic and image processing techniques to develop a robust and highly …

[PDF][PDF] Embedding information in DCT coefficients based on average covariance

N Sathisha, KS Babu, KB Raja… - International Journal …, 2011 - researchgate.net
The steganography is a covert communication to transfer confidential information over an
internet. In this paper we propose Embedding Information in Discrete Cosine Transform …

Image steganography using hybrid soft computing techniques–a survey

BA Usha, HS Anupama, KN Sangeetha… - … and Virtual Mobile …, 2021 - ieeexplore.ieee.org
The technique of concealing information within photos, videos, music etc. is called image
steganography. Steganography excels in that it does not disclose the presence of any data …

A Lossless Secure data embedding in image using DCT and Randomize key generator

MV Malakooti, M Khederzdeh - 2012 Second International …, 2012 - ieeexplore.ieee.org
This paper presents a novel Lossless Secure data embedding algorithm in which the vital
information can be embedded into the cover image while preserving the quality of cover …