microprocessor and microsystem
EmbAu: A Novel Technique to Embed Audio Data Using Shuffled Frog Leaping Algorithm
Nokhwal, Sahil, Pahune, Saurabh, Chaudhary, Ankit
The aim of steganographic algorithms is to identify the appropriate pixel positions in the host or cover image, where bits of sensitive information can be concealed for data encryption. Work is being done to improve the capacity to integrate sensitive information and to maintain the visual appearance of the steganographic image. Consequently, steganography is a challenging research area. In our currently proposed image steganographic technique, we used the Shuffled Frog Leaping Algorithm (SFLA) to determine the order of pixels by which sensitive information can be placed in the cover image. To achieve greater embedding capacity, pixels from the spatial domain of the cover image are carefully chosen and used for placing the sensitive data. Bolstered via image steganography, the final image after embedding is resistant to steganalytic attacks. The SFLA algorithm serves in the optimal pixels selection of any colored (RGB) cover image for secret bit embedding. Using the fitness function, the SFLA benefits by reaching a minimum cost value in an acceptable amount of time. The pixels for embedding are meticulously chosen to minimize the host image's distortion upon embedding. Moreover, an effort has been taken to make the detection of embedded data in the steganographic image a formidable challenge. Due to the enormous need for audio data encryption in the current world, we feel that our suggested method has significant potential in real-world applications. In this paper, we propose and compare our strategy to existing steganographic methods.
- North America > United States > Tennessee > Shelby County > Memphis (0.04)
- North America > United States > Ohio > Franklin County > Dublin (0.04)
- North America > United States > Missouri > St. Louis County > St. Louis (0.04)
'Tortured phrases' give away fabricated research papers
The group, led by Guillaume Cabanac at the University of Toulouse in France, could not understand why researchers would use the terms'counterfeit consciousness', 'profound neural organization' and'colossal information' in place of the more widely recognized terms'artificial intelligence', 'deep neural network' and'big data'. Further investigation revealed that these strange terms -- which they dub "tortured phrases" -- are probably the result of automated translation or software that attempts to disguise plagiarism. And they seem to be rife in computer-science papers. Research-integrity sleuths say that Cabanac and his colleagues have uncovered a new type of fabricated research paper, and that their work, posted in a preprint on arXiv on 12 July1, might expose only the tip of the iceberg when it comes to the literature affected. To get a sense of how many papers are affected, the researchers ran a search for 30 tortured phrases in journal articles indexed in the citation database Dimensions.
- Europe > France > Occitanie > Haute-Garonne > Toulouse (0.25)
- Oceania > Australia > New South Wales > Sydney (0.05)
- North America > United States > California (0.05)
- Asia > China (0.05)