期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security
1
作者 Hanan Hardan Osama A.Khashan mohammad alshinwan 《Computers, Materials & Continua》 2025年第7期1681-1710,共30页
This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three c... This study introduces an Edge-Based Data Hiding and Extraction Algorithm(EBDHEA)to address the problem of data embedding in images while preserving robust security and high image quality.The algorithm produces three classes of pixels from the pixels in the cover image:edges found by the Canny edge detection method,pixels arising from the expansion of neighboring edge pixels,and pixels that are neither edges nor components of the neighboring edge pixels.The number of Least Significant Bits(LSBs)that are used to hide data depends on these classifications.Furthermore,the lossless compression method,Huffman coding,improves image data capacity.To increase the security of the steganographic process,secret messages are encrypted using the XOR encryption technique before being embedded.Metrics such as the Mean Squared Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Structural Similarity Index Measure(SSIM)are used to assess the efficacy of this algorithm and are compared to previous methods.The findings demonstrate that the suggested approach achieves high similarity between the original and modified images with a maximum PSNR of 60.7 dB for a payload of 18,750 bytes,a maximum SSIM of 0.999 for a payload of 314,572.8 bytes,and a maximum Video Information Fidelity(VIF)of 0.95 for a payload of 23,592 bytes.Normalized Cross-Correlation(NCC)values are very close to 1.In addition,the performance of EBDHEA is implemented on Secure Medical Image Transmission as a real-world example,and the performance is tested against three types of attacks:RS Steganalysis,Chi-square attack,and visual attack,and compared with two deep learning models,such as SRNet and XuNet. 展开更多
关键词 STEGANOGRAPHY least significant bit(LSB) edge detection STEGO-IMAGE data hiding
在线阅读 下载PDF
UltraSegNet:A Hybrid Deep Learning Framework for Enhanced Breast Cancer Segmentation and Classification on Ultrasound Images
2
作者 Suhaila Abuowaida Hamza Abu Owida +3 位作者 Deema Mohammed Alsekait Nawaf Alshdaifat Diaa Salama Abd Elminaam mohammad alshinwan 《Computers, Materials & Continua》 2025年第5期3303-3333,共31页
Segmenting a breast ultrasound image is still challenging due to the presence of speckle noise,dependency on the operator,and the variation of image quality.This paper presents the UltraSegNet architecture that addres... Segmenting a breast ultrasound image is still challenging due to the presence of speckle noise,dependency on the operator,and the variation of image quality.This paper presents the UltraSegNet architecture that addresses these challenges through three key technical innovations:This work adds three things:(1)a changed ResNet-50 backbone with sequential 3×3 convolutions to keep fine anatomical details that are needed for finding lesion boundaries;(2)a computationally efficient regional attention mechanism that works on high-resolution features without using a transformer’s extra memory;and(3)an adaptive feature fusion strategy that changes local and global featuresbasedonhowthe image isbeing used.Extensive evaluation on two distinct datasets demonstrates UltraSegNet’s superior performance:On the BUSI dataset,it obtains a precision of 0.915,a recall of 0.908,and an F1 score of 0.911.In the UDAIT dataset,it achieves robust performance across the board,with a precision of 0.901 and recall of 0.894.Importantly,these improvements are achieved at clinically feasible computation times,taking 235 ms per image on standard GPU hardware.Notably,UltraSegNet does amazingly well on difficult small lesions(less than 10 mm),achieving a detection accuracy of 0.891.This is a huge improvement over traditional methods that have a hard time with small-scale features,as standard models can only achieve 0.63–0.71 accuracy.This improvement in small lesion detection is particularly crucial for early-stage breast cancer identification.Results from this work demonstrate that UltraSegNet can be practically deployable in clinical workflows to improve breast cancer screening accuracy. 展开更多
关键词 Breast cancer ultrasound image SEGMENTATION CLASSIFICATION deep learning
在线阅读 下载PDF
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT
3
作者 Arar Al Tawil Laiali Almazaydeh +3 位作者 Doaa Qawasmeh Baraah Qawasmeh mohammad alshinwan Khaled Elleithy 《Computers, Materials & Continua》 SCIE EI 2024年第11期3395-3412,共18页
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Te... Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks.The study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron algorithms.The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching 0.99.This study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems. 展开更多
关键词 ATTACKS email phishing machine learning security representations from transformers(BERT) text classifeir natural language processing(NLP)
在线阅读 下载PDF
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
4
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura mohammad alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
在线阅读 下载PDF
Recent Advances of Chimp Optimization Algorithm:Variants and Applications
5
作者 mohammad Sh.Daoud mohammad Shehab +6 位作者 Laith Abualigah mohammad alshinwan Mohamed Abd Elaziz Mohd Khaled Yousef Shambour Diego Oliva mohammad AAlia Raed Abu Zitar 《Journal of Bionic Engineering》 SCIE EI CSCD 2023年第6期2840-2862,共23页
Chimp Optimization Algorithm(ChOA)is one of the recent metaheuristics swarm intelligence methods.It has been widely tailored for a wide variety of optimization problems due to its impressive characteristics over other... Chimp Optimization Algorithm(ChOA)is one of the recent metaheuristics swarm intelligence methods.It has been widely tailored for a wide variety of optimization problems due to its impressive characteristics over other swarm intelligence methods:it has very few parameters,and no derivation information is required in the initial search.Also,it is simple,easy to use,flexible,scalable,and has a special capability to strike the right balance between exploration and exploitation during the search which leads to favorable convergence.Therefore,the ChOA has recently gained a very big research interest with tremendous audiences from several domains in a very short time.Thus,in this review paper,several research publications using ChOA have been overviewed and summarized.Initially,introductory information about ChOA is provided which illustrates the natural foundation context and its related optimization conceptual framework.The main operations of ChOA are procedurally discussed,and the theoretical foundation is described.Furthermore,the recent versions of ChOA are discussed in detail which are categorized into modified,hybridized,and paralleled versions.The main applications of ChOA are also thoroughly described.The applications belong to the domains of economics,image processing,engineering,neural network,power and energy,networks,etc.Evaluation of ChOA is also provided.The review paper will be helpful for the researchers and practitioners of ChOA belonging to a wide range of audiences from the domains of optimization,engineering,medical,data mining,and clustering.As well,it is wealthy in research on health,environment,and public safety.Also,it will aid those who are interested by providing them with potential future research. 展开更多
关键词 Artificial intelligence Nature-inspired optimization algorithms Chimp optimization algorithm Optimization problems
在线阅读 下载PDF
A Low Complexity ML-Based Methods for Malware Classification
6
作者 Mahmoud E.Farfoura Ahmad Alkhatib +4 位作者 Deema Mohammed Alsekait mohammad alshinwan Sahar A.El-Rahman Didi Rosiyadi Diaa Salama Abd Elminaam 《Computers, Materials & Continua》 SCIE EI 2024年第9期4833-4857,共25页
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware identification.Using ... The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware identification.Using an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique(IFDRT),the authors have significantly reduced the feature space while retaining critical information necessary for malware classification.This technique optimizes the model’s performance and reduces computational requirements.The proposed method is demonstrated by applying it to the BODMAS malware dataset,which contains 57,293 malware samples and 77,142 benign samples,each with a 2381-feature vector.Through the IFDRT method,the dataset is transformed,reducing the number of features while maintaining essential data for accurate classification.The evaluation results show outstanding performance,with an F1 score of 0.984 and a high accuracy of 98.5%using only two reduced features.This demonstrates the method’s ability to classify malware samples accurately while minimizing processing time.The method allows for improving computational efficiency by reducing the feature space,which decreases the memory and time requirements for training and prediction.The new method’s effectiveness is confirmed by the calculations,which indicate significant improvements in malware classification accuracy and efficiency.The research results enhance existing malware detection techniques and can be applied in various cybersecurity applications,including real-timemalware detection on resource-constrained devices.Novelty and scientific contribution lie in the development of the IFDRT method,which provides a robust and efficient solution for feature reduction in ML-based malware classification,paving the way for more effective and scalable cybersecurity measures. 展开更多
关键词 Malware detection ML-based models dimensionality reduction feature engineering
在线阅读 下载PDF
Erratum to:Recent Advances of Chimp Optimization Algorithm:Variants and Applications
7
作者 mohammad Sh.Daoud mohammad Shehab +6 位作者 Laith Abualigah mohammad alshinwan Mohamed Abd Elaziz Mohd Khaled Yousef Shambour Diego Oliva mohammad A.Alia Raed Abu Zitar 《Journal of Bionic Engineering》 SCIE EI CSCD 2024年第3期1618-1618,共1页
Erratum to:J Bionic Eng https://doi.org/10.1007/s42235-023-00414-1.In this article the statement in the Funding information section was incorrectly given as‘22UQU4361183DSR03’and should have read‘23UQU4361183DSR03’.
关键词 STATEMENT SECTION correctly
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部