Pub Date : 2023-05-10DOI: 10.2174/2352096516666230510125238
Ankit Verma, S. Deswal
The Internet of Things (IoT) is widely used because of the connectivity of devices with the Internet which provides accessibility, quick transmission, and broader coverage. IoT networks provide vast connectivity but finding the best path for sharing information is a big challenge because of limited resources like limited power and limited bandwidth. The routing protocol for low power lossy network (RPL) is standard protocol but it selects a node that has already been selected in a busty network. The fog computing technique is combined with RPL and the new objective function is used to design FOG-RPL which is the optimum routing protocol that reduces the network load using the fog computing principle and selects the right node using the new objective function. The simulation is performed and experimental results show that FOG-RPL gives better results in terms of improvement and in terms of performance parameters. The FOG-RPL protocol uses the fog computing principle with a new objective function and performance analysis shows that as compared to the existing routing protocol, it is more efficient.
{"title":"FOG-RPL: Fog Computing based Routing Protocol for IoT Networks","authors":"Ankit Verma, S. Deswal","doi":"10.2174/2352096516666230510125238","DOIUrl":"https://doi.org/10.2174/2352096516666230510125238","url":null,"abstract":"\u0000\u0000The Internet of Things (IoT) is widely used because of the connectivity of devices with the Internet which provides accessibility, quick transmission, and broader coverage. IoT networks provide vast connectivity but finding the best path for sharing information is a big challenge because of limited resources like limited power and limited bandwidth. The routing protocol for low power lossy network (RPL) is standard protocol but it selects a node that has already been selected in a busty network.\u0000\u0000\u0000\u0000The fog computing technique is combined with RPL and the new objective function is used to design FOG-RPL which is the optimum routing protocol that reduces the network load using the fog computing principle and selects the right node using the new objective function.\u0000\u0000\u0000\u0000The simulation is performed and experimental results show that FOG-RPL gives better results in terms of improvement and in terms of performance parameters.\u0000\u0000\u0000\u0000The FOG-RPL protocol uses the fog computing principle with a new objective function and performance analysis shows that as compared to the existing routing protocol, it is more efficient.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"88 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91132249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-10DOI: 10.2174/2215083810666230510113140
D. Yadav, Sneha Mishra
The significant aim of the proposed work is to develop an adaptive method to compute the threshold during run-time and update it adaptively for each pixel in the testing phase. It classifies motion-oriented pixels from the scene for moving objects using background subtraction and enhances using post-processing. According to the huge demand for surveillance system, society is towards an intelligent video surveillance system that detects and track moving objects from video captured through a surveillance camera. So, it is very crucial and highly recommended throughout the globe in numerous domains such as video-based surveillance, healthcare, transportation, and many more. Practically, this research area faces lots of challenging issues such as illumination variation, cluttered background, camouflage, etc. So, this paper has developed an adaptive background subtraction method to handle such challenging problems. • To focus and study the problematic video data captured through the camera sensor. • To handle challenging issues available in real-time video scenes. • To develop a background subtraction method and update the background model adap-tively for moving object detection. The proposed method has been accomplished using the following sections: • Background model construction • Automatic generation of threshold • Background subtraction • Maintenance of background model The qualitative analysis of the proposed work is experimented with publicly available datasets and compared with considered state-of-the-art methods. In this work, library sequence (thermal data) of CDNET and other color video frame sequences Foreground aperture, Waving Tree and Camouflage are considered from Microsoft’s Wallflower. The quantitative values depicted in Table-1 this work demonstrate the better performance of the proposed method as compared to state-of-the-art methods. It also generates better outcomes and handles the problem of a dynamic environment and illumination variation. Currently, the world is demanding computer vision-based security and surveillance-based applications for society. This work has provided a method for the detection of moving information using an adaptive method of background subtraction approach for moving object detection in video scenes. The performance evaluation depicts better average results as compared to considered peer methods.
{"title":"Intelligent technique for moving object detection from problematic video captured through camera sensor","authors":"D. Yadav, Sneha Mishra","doi":"10.2174/2215083810666230510113140","DOIUrl":"https://doi.org/10.2174/2215083810666230510113140","url":null,"abstract":"\u0000\u0000The significant aim of the proposed work is to develop an adaptive method to compute the threshold during run-time and update it adaptively for each pixel in the testing phase. It classifies motion-oriented pixels from the scene for moving objects using background subtraction and enhances using post-processing.\u0000\u0000\u0000\u0000According to the huge demand for surveillance system, society is towards an intelligent video surveillance system that detects and track moving objects from video captured through a surveillance camera. So, it is very crucial and highly recommended throughout the globe in numerous domains such as video-based surveillance, healthcare, transportation, and many more. Practically, this research area faces lots of challenging issues such as illumination variation, cluttered background, camouflage, etc. So, this paper has developed an adaptive background subtraction method to handle such challenging problems.\u0000\u0000\u0000\u0000• To focus and study the problematic video data captured through the camera sensor.\u0000• To handle challenging issues available in real-time video scenes.\u0000• To develop a background subtraction method and update the background model adap-tively for moving object detection.\u0000\u0000\u0000\u0000The proposed method has been accomplished using the following sections: \u0000• Background model construction \u0000• Automatic generation of threshold \u0000• Background subtraction\u0000• Maintenance of background model\u0000\u0000\u0000\u0000The qualitative analysis of the proposed work is experimented with publicly available datasets and compared with considered state-of-the-art methods. In this work, library sequence (thermal data) of CDNET and other color video frame sequences Foreground aperture, Waving Tree and Camouflage are considered from Microsoft’s Wallflower. The quantitative values depicted in Table-1 this work demonstrate the better performance of the proposed method as compared to state-of-the-art methods. It also generates better outcomes and handles the problem of a dynamic environment and illumination variation.\u0000\u0000\u0000\u0000Currently, the world is demanding computer vision-based security and surveillance-based applications for society. This work has provided a method for the detection of moving information using an adaptive method of background subtraction approach for moving object detection in video scenes. The performance evaluation depicts better average results as compared to considered peer methods.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"55 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86409332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-05DOI: 10.2174/2352096516666230505111206
Bing-Tuan Gao, Wei Zhang, Lin Zheng, Bin Xu
The electro-hydraulic load simulator can simulate any force (torque) load required by the loaded object under test conditions, which greatly reduces the equipment development time and cost. However, the process of force loading inevitably creates a surplus force (torque). The existence of surplus force (torque) in the system will seriously interfere with the loading accuracy of the system and even damage the equipment in serious cases. In this paper, based on the research status of the suppression and compensation of the surplus force (torque) in the electro-hydraulic load simulator, the effective control strategies and methods to overcome the surplus force (torque) in the system are summarized. This paper analyzes the generation mechanism of the surplus force (torque), and summarizes the effective strategies to overcome the surplus force (torque) of the system in structural compensation and control compensation. Using the control method to compensate for the surplus force (torque) has the advantages of simple structure, convenient debugging, and strong universality. It is widely used in the electro-hydraulic load simulator to suppress the surplus force (torque). With the development of control theory, more and more control strategies and methods are applied to restrain and compensate for the surplus force (torque) in the electro-hydraulic load simulator, which not only restrains the surplus force (torque) in the system but also improves the loading accuracy and anti-interference.
{"title":"Research on Surplus Force (torque) Control and Compensation of Electro hydraulic Load Simulator","authors":"Bing-Tuan Gao, Wei Zhang, Lin Zheng, Bin Xu","doi":"10.2174/2352096516666230505111206","DOIUrl":"https://doi.org/10.2174/2352096516666230505111206","url":null,"abstract":"\u0000\u0000The electro-hydraulic load simulator can simulate any force (torque) load required by the loaded object under test conditions, which greatly reduces the equipment development time and cost. However, the process of force loading inevitably creates a surplus force (torque). The existence of surplus force (torque) in the system will seriously interfere with the loading accuracy of the system and even damage the equipment in serious cases.\u0000\u0000\u0000\u0000In this paper, based on the research status of the suppression and compensation of the surplus force (torque) in the electro-hydraulic load simulator, the effective control strategies and methods to overcome the surplus force (torque) in the system are summarized.\u0000\u0000\u0000\u0000This paper analyzes the generation mechanism of the surplus force (torque), and summarizes the effective strategies to overcome the surplus force (torque) of the system in structural compensation and control compensation.\u0000\u0000\u0000\u0000Using the control method to compensate for the surplus force (torque) has the advantages of simple structure, convenient debugging, and strong universality. It is widely used in the electro-hydraulic load simulator to suppress the surplus force (torque).\u0000\u0000\u0000\u0000With the development of control theory, more and more control strategies and methods are applied to restrain and compensate for the surplus force (torque) in the electro-hydraulic load simulator, which not only restrains the surplus force (torque) in the system but also improves the loading accuracy and anti-interference.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"78 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77419527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-04DOI: 10.2174/2352096516666230504111123
Yuancheng Li, Yazhuo Zhang
In recent years, the frequent occurrence of network security attacks in the power field has brought huge risks to the production, transmission, and supply of power systems, and Advanced Persistent Threat (APT) is a covert advanced network security attack, which has become one of the network security risks that cannot be ignored in the construction of new power systems. This study aims to resist the increasing risk of APT attacks in the construction of new power systems, this paper proposes an attack detection model based on Deep Packet Inspection (DPI) and Transformer Firstly, we extracted 606 traffic characteristics from the original traffic data through the extended CIC Flowmeter and used them all to train the Transformer network. Then, we used the DPI-Transformer model and traffic labels to perform feature analysis on the traffic data and finally obtained the APT-Score. If the APT-Score is greater than the threshold, the alarm module is triggered. By analyzing the headers and payloads of the network traffic in the APT-2020 dataset, the experimental results show that the detection accuracy of APT attacks by the DPI-Transformer detection model is significantly higher than that of the current mainstream APT attack detection algorithms. Combined with the characteristics of the new power system and APT attacks, this paper proposes an attack detection model DPI-Transformer, which proves that the model has greatly improved the detection accuracy.
{"title":"APT Attack Detection of a New Power System Based on DPI-Transformer","authors":"Yuancheng Li, Yazhuo Zhang","doi":"10.2174/2352096516666230504111123","DOIUrl":"https://doi.org/10.2174/2352096516666230504111123","url":null,"abstract":"\u0000\u0000In recent years, the frequent occurrence of network security attacks in the power field has brought huge risks to the production, transmission, and supply of power systems, and Advanced Persistent Threat (APT) is a covert advanced network security attack, which has become one of the network security risks that cannot be ignored in the construction of new power systems.\u0000\u0000\u0000\u0000This study aims to resist the increasing risk of APT attacks in the construction of new power systems, this paper proposes an attack detection model based on Deep Packet Inspection (DPI) and Transformer\u0000\u0000\u0000\u0000Firstly, we extracted 606 traffic characteristics from the original traffic data through the extended CIC Flowmeter and used them all to train the Transformer network. Then, we used the DPI-Transformer model and traffic labels to perform feature analysis on the traffic data and finally obtained the APT-Score. If the APT-Score is greater than the threshold, the alarm module is triggered.\u0000\u0000\u0000\u0000By analyzing the headers and payloads of the network traffic in the APT-2020 dataset, the experimental results show that the detection accuracy of APT attacks by the DPI-Transformer detection model is significantly higher than that of the current mainstream APT attack detection algorithms.\u0000\u0000\u0000\u0000Combined with the characteristics of the new power system and APT attacks, this paper proposes an attack detection model DPI-Transformer, which proves that the model has greatly improved the detection accuracy.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"33 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81884223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Customers expect quality, uninterrupted power with cost-effective electricity in the latest trend. However, outages, severe storms, old infrastructure, and cost pressures can lead to ambiguity in power generation and transmission. To improve line power transmission capability, the right flexible AC transmission systems (FACTS) device may save millions of dollars. In this study, a FACTS controller named Optimal Generalized Interline Power Flow Controller (OGIPFC) was developed. Furthermore, for optimization, the Modified Marine Predator Algorithm (MMPA), which is a modification of the recently developed Marine Predator Algorithm (MPA), was used. The optimum technique was used to evaluate a set of prioritized considered objective minimizations. A variety of factors must be maximized, such as generation cost, emissions, and power loss. The performance of the proposed algorithm was analysed on benchmark test functions, and then single objective optimization problems of standard IEEE-30 bus system were solved and compared with the existing algorithms. The proposed algorithm was restricted to solving the single objective problem only, so it was further implemented with non-dominating sorting to solve the multi-objective optimization problem. The proposed multi-objective version is named as Non-dominating Sorting Modified Marine Predator Algorithm (NSMMPA), and it was validated on benchmark test functions and the IEEE-30 bus system. Finally, the OPF problem was solved with the incorporation of OGIPFC using the proposed methods, which resulted in better solutions and made the system more effective in operation.
{"title":"Multi-Objective Optimization in the Presence of OGIPFC using NSMMP Algorithm","authors":"Balasubbareddy Mallala, Venkata Prasad Papana, Kowstubha Palle","doi":"10.2174/2352096516666230504105054","DOIUrl":"https://doi.org/10.2174/2352096516666230504105054","url":null,"abstract":"\u0000\u0000Customers expect quality, uninterrupted power with cost-effective electricity in the latest trend. However, outages, severe storms, old infrastructure, and cost pressures can lead to ambiguity in power generation and transmission. To improve line power transmission capability, the right flexible AC transmission systems (FACTS) device may save millions of dollars.\u0000\u0000\u0000\u0000In this study, a FACTS controller named Optimal Generalized Interline Power Flow Controller (OGIPFC) was developed. Furthermore, for optimization, the Modified Marine Predator Algorithm (MMPA), which is a modification of the recently developed Marine Predator Algorithm (MPA), was used. The optimum technique was used to evaluate a set of prioritized considered objective minimizations. A variety of factors must be maximized, such as generation cost, emissions, and power loss.\u0000\u0000\u0000\u0000The performance of the proposed algorithm was analysed on benchmark test functions, and then single objective optimization problems of standard IEEE-30 bus system were solved and compared with the existing algorithms. The proposed algorithm was restricted to solving the single objective problem only, so it was further implemented with non-dominating sorting to solve the multi-objective optimization problem. The proposed multi-objective version is named as Non-dominating Sorting Modified Marine Predator Algorithm (NSMMPA), and it was validated on benchmark test functions and the IEEE-30 bus system.\u0000\u0000\u0000\u0000Finally, the OPF problem was solved with the incorporation of OGIPFC using the proposed methods, which resulted in better solutions and made the system more effective in operation.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"27 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89313756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-03DOI: 10.2174/2352096516666230503150934
Sachin Maithani, Shivam Bansal, G. Saini, Balwinder Singh Dhaliwal
In this article, a Planar Inverted F Antenna (PIFA) has been designed using low-cost commercially available transparent laminated sheets. Energy Dispersive X-ray (EDX) analysis is used to acquire the element composition of the transparent laminated sheet. The flexibility is attained using a market-available low-cost Polyethylene Terephthalate (PET) sheet as a substrate. The dielectric properties of this non-conventional laminated sheet need to be identified for antenna design and the microstrip ring resonator test method is used to determine the dielectric properties of the multilayer PET sheets. The linear match has been observed on multilayer laminated PET sheets for dielectric properties and radiation characteristics. Adhesive copper foil of a thickness of 0.08 mm has been used as for conducting layer on the PET lamination sheet. As per the literature survey, it is evident that this is the first attempt to use the reported methodology for PIFA design application. The gain of proposed antenna is 5.2dB. The designed flexible antenna has been developed for wearable and IoT applications in 2.45 GHz ISM band. A good match has been observed between the simulated and measured characteristics.
{"title":"Permittivity- Customizable Low-Cost Laminated PET Sheet Multilayer Substrate to Design Flexible and Conformal Planar Inverted F Antenna","authors":"Sachin Maithani, Shivam Bansal, G. Saini, Balwinder Singh Dhaliwal","doi":"10.2174/2352096516666230503150934","DOIUrl":"https://doi.org/10.2174/2352096516666230503150934","url":null,"abstract":"\u0000\u0000In this article, a Planar Inverted F Antenna (PIFA) has been designed using low-cost commercially available transparent laminated sheets. Energy Dispersive X-ray (EDX) analysis is used to acquire the element composition of the transparent laminated sheet.\u0000\u0000\u0000\u0000The flexibility is attained using a market-available low-cost Polyethylene Terephthalate (PET) sheet as a substrate. The dielectric properties of this non-conventional laminated sheet need to be identified for antenna design and the microstrip ring resonator test method is used to determine the dielectric properties of the multilayer PET sheets.\u0000\u0000\u0000\u0000The linear match has been observed on multilayer laminated PET sheets for dielectric properties and radiation characteristics. Adhesive copper foil of a thickness of 0.08 mm has been used as for conducting layer on the PET lamination sheet. As per the literature survey, it is evident that this is the first attempt to use the reported methodology for PIFA design application. The gain of proposed antenna is 5.2dB.\u0000\u0000\u0000\u0000The designed flexible antenna has been developed for wearable and IoT applications in 2.45 GHz ISM band. A good match has been observed between the simulated and measured characteristics.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"13 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82635273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-02DOI: 10.2174/2352096516666230502145422
Ravinder Saini, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav, D. Kumari
The necessity for data security is demanding in the digital age. The main technique for achieving data security is Steganography. The technique of camouflaging the secret object behind another cover object is known as Steganography. A novel, robust, high payload, and imperceptible image steganography approach using matrix inverse in the spatial domain are proposed in this manuscript. The basic idea is to devise a robust novel approach against various image processing attacks, like cropping, compression, filters, and noise. The study's objective is to develop a novel data-hiding approach that increases imperceptibility and payload capacity and is robust against various image processing attacks, like filters, compression, cropping, and noise. The matrix inverse procedure is used for the insertion and extraction of data. The symmetry feature of the matrix inverse makes the task of insertion of data simple and efficient. It also increases the hiding capacity while maintaining a finer level of imperceptibility and robustness. MATLAB is used for the implementation of the new technique and results analysis.The matrix inverse procedure is used for the insertion and extraction of data. The symmetry feature of the matrix inverse makes the task of insertion of data simple and efficient. It also increases the hiding capacity while maintaining a finer level of imperceptibility and robustness. MATLAB is used for the implementation of the new technique and results analysis. The proposed method's robustness has been analyzed against image processing assaults such as the inclusion of various noises, cropping, a variety of filters, and compression assaults. The imperceptibility of the approach has been tested successfully using PSNR, BER, and NCC metrics. The proposed method has been compared with the other two techniques. The experimental and comparison results depict that the proposed approach provides high hiding capacity, finer robustness, and imperceptibility. A novel, robust and imperceptible approach has been developed in this manuscript. The proposed method has been compared with the methods developed by Jung & Yoo and Joshi & Gill. The experimental findings show that the proposed technique offers better resilience, payload capacity, and finer imperceptibility.
{"title":"Matrix Inverse-based Highly Payload Novel Approach for Covert Transmission","authors":"Ravinder Saini, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav, D. Kumari","doi":"10.2174/2352096516666230502145422","DOIUrl":"https://doi.org/10.2174/2352096516666230502145422","url":null,"abstract":"\u0000\u0000The necessity for data security is demanding in the digital age. The main\u0000technique for achieving data security is Steganography. The technique of camouflaging the secret\u0000object behind another cover object is known as Steganography. A novel, robust, high payload, and\u0000imperceptible image steganography approach using matrix inverse in the spatial domain are proposed\u0000in this manuscript. The basic idea is to devise a robust novel approach against various image\u0000processing attacks, like cropping, compression, filters, and noise.\u0000\u0000\u0000\u0000The study's objective is to develop a novel data-hiding approach that increases imperceptibility\u0000and payload capacity and is robust against various image processing attacks, like filters,\u0000compression, cropping, and noise.\u0000\u0000\u0000\u0000The matrix inverse procedure is used for the insertion and extraction of data. The symmetry\u0000feature of the matrix inverse makes the task of insertion of data simple and efficient. It also\u0000increases the hiding capacity while maintaining a finer level of imperceptibility and robustness.\u0000MATLAB is used for the implementation of the new technique and results analysis.The matrix inverse procedure is used for the insertion and extraction of data. The symmetry\u0000feature of the matrix inverse makes the task of insertion of data simple and efficient. It also\u0000increases the hiding capacity while maintaining a finer level of imperceptibility and robustness.\u0000MATLAB is used for the implementation of the new technique and results analysis.\u0000\u0000\u0000\u0000The proposed method's robustness has been analyzed against image processing assaults\u0000such as the inclusion of various noises, cropping, a variety of filters, and compression assaults.\u0000The imperceptibility of the approach has been tested successfully using PSNR, BER, and NCC\u0000metrics. The proposed method has been compared with the other two techniques. The experimental\u0000and comparison results depict that the proposed approach provides high hiding capacity,\u0000finer robustness, and imperceptibility.\u0000\u0000\u0000\u0000A novel, robust and imperceptible approach has been developed in this manuscript.\u0000The proposed method has been compared with the methods developed by Jung & Yoo and Joshi\u0000& Gill. The experimental findings show that the proposed technique offers better resilience, payload\u0000capacity, and finer imperceptibility.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"43 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87421484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}