Home Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform
Article Open Access

Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform

  • Vijay Kumar EMAIL logo and Dinesh Kumar
Published/Copyright: October 14, 2017
Become an author with De Gruyter Brill

Abstract

Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.

1 Introduction

The development in the Internet and multimedia processing technologies has made the distribution of digital data more easy and even at low cost. The data can be well edited with almost trifling loss using multimedia processing techniques. Therefore, the protection of sensitive data is a major issue. To resolve this problem, a number of techniques for protecting the sensitive data have been proposed. Among them, digital steganography has drawn significant attention from the research community.

Digital steganography refers to the process of hiding secret data into carrier data such that the existence of the secret data is undetectable. The digital images, audios, videos, and other files can be used as a carrier to embed the secret data. The use of digital image is of particular interest for the research community as it requires low bandwidth for exchange [5].

The image steganography techniques are broadly classified into two main categories: spatial domain and frequency domain techniques [1]. The former embeds the secret data into the least significant pixels of cover data. The least significant bit (LSB) is the most widely used spatial domain technique. The other well-known techniques are pixel value differencing (PVD) and histogram shifting. The main pros of these techniques are ease in understanding and its implementation. However, these are sensitive toward image-processing attacks.

The frequency domain steganography technique transforms the cover data into frequency domain coefficients and then embeds the secret message in it. The transformation techniques used are discrete Fourier transform (DFT), discrete wavelet transform (DWT), and discrete cosine transform (DCT). DFT-based techniques introduce round-off errors that make them unsuitable for steganography. However, a few techniques are available in literature: for example, McKeon [16] used 2D DFT for steganography. The main drawbacks of the DCT-based techniques are small embedding capacity and artifact problems. In contrast to DFT, DWT-based techniques provide both spatial as well as temporal information. They have large embedding capacity compared to DCT. They are more robust against noise and signal-processing attacks. Hence, DWT has been widely used for image steganography. A large number of DWT-based color image steganography techniques have been reported in literature [1, 5]. However, these techniques are least robust against image-processing attacks. To solve these problems, there is a need to find the optimum block replacement approach for hiding the data onto wavelet coefficients of cover color image that are robust against attacks.

This paper intends to use for color images, the same work already proposed for grayscale images, by the authors [15]. The work uses two new concepts, namely, blocking and secret key computation. The main purpose of introducing a blocking concept is to reduce the effect of an embedded secret image into the cover color image. Both cover and secret images are divided into small non-overlapping blocks. The blocks of secret images are embedded into blocks of three planes of cover color images using the best matching criteria. The secret key computation procedure has been proposed to store the address of the best-matched blocks of planes of cover image with those of the secret image based on the least error criterion. The performance of the proposed color image steganography has been tested on a variety of images and compared with several other recently proposed techniques.

The remaining structure of the paper is as follows: Section 2 presents the related works. The proposed DWT-based image steganography is presented in Section 3. The experimental results are reported in Section 4. The concluding remarks are depicted in Section 5.

2 Related Works

Numerous color image steganography techniques are reported in literature. The well-known steganography technique is the LSB substitution, which is a well-known steganography technique in which the LSB of the pixels is modified to embed the secret data [4]. The drawback of this technique is that it has a much smaller peak signal to noise ratio (PSNR) value, and the extracted secret image visual is not good.

Wu and Tsai [24] presented an edge-based steganography method that utilizes the concept of pixel value differencing. They also discovered that edge-area pixels can carry more data. This method was further extended by Chen et al. [6]. They utilized the hybrid edge detection mechanism that combines fuzzy and canny edge detector. This method provides better image quality. This method was further improved by Ioannidou et al. [10]. Ioannidou et al. [10] used Sobel and Laplacian filters instead of canny. The main drawback of this technique is the overhead of two different files that contain the information about data embedding.

Kumar and Kumar [13] proposed a steganography technique based on the combination of the DCT and the DWT. They applied the DCT on a secret image to find the DCT coefficients. Thereafter, they applied the DWT on the cover image and the DCT coefficient image to find the image features. The extracted image features of the secret image are embedded into the cover image. The main drawback of this technique is to hide the image features only in one portion of the cover image. Kumar and Kumar [14] proposed a new color image steganography technique using the DWT. They divided the cover image based on the red, green and blue (RGB) method, thereafter, hiding the secret image into the RGB of the cover image. However, the embedding capacity of this approach is low.

Karim et al. [12] proposed a novel approach based on the LSB using a secret key. The secret key encrypts the hidden information, and then, it is stored into a different position of the LSB of the image. This method provides better security than the other existing techniques. Shejul and Kulkarni [22] proposed an algorithm in which binary images are embedded inside the cover image by taking the color planes of the cover image. The secret image is inserted into the cover image by cropping the cover image according to the skin tone detection and then applying the DWT. However, the embedding capacity of this approach is too low.

Rubab and Younus [21] proposed a method using the DWT and the Blowfish encryption technique to conceal the text message in the color image. The drawback of this technique is that it is computationally expensive. Bassil [3] proposed a color image steganography that utilizes the canny edge detector. The LSBs of every edge pixel identified by the canny edge detector are replaced with secret bits. However, it did not provide the guarantee of correct retrieval of the secret data. Hemalatha et al. [9] designed an image steganography technique to hide both image and key in the color cover image using the DWT and the integer wavelet transform (IWT). However, the security of the hidden data is less. Ghebleh and Kanso [7] proposed a chaotic algorithm technique based on a three-dimensional chaotic cat map and the DWT. They embedded the cat map of a secret image into the cover image. Kanan and Nazeri [11] designed a lossless spatial domain technique that uses a genetic algorithm to find the best positions in the cover image for data embedding. However, it suffers from large computational complexity problem.

Ou and Sun [18] proposed a method for image steganography based on the absolute moment block truncation coding (AMBTC). In this scheme, a threshold computed to classify the blocks of the AMBTC compressed codes as smooth or complex blocks in which data can be embedded. The two quantization levels in smooth block are re-calculated to minimize the distortion in the image. Gunjal and Mali [8] proposed a technique that utilized both the DWT and the singular value decomposition (SVD). They applied the DWT on the cover image to decompose in different bands. Thereafter, the SVD was applied on the approximation band to further decompose. The secret data were embedded in the decomposed band to increase the security. Pan et al. [19] proposed a technique that combined compressive sensing with subsampling. The cover image tends to be compressed in the transform domain. The characteristics of compressive sensing, dimensional reduction, and random projection were utilized to insert the secret message into the compressive sensing transform domain of the sparse image. The bit correction rate between the original secret image and the extracted message was used to compute the accuracy [14, 18].

Yang and Wang [25] developed a color image steganography technique based on a smart pixel-adjustment process. The block of two adjacent color pixels is used to embed the secret data. However, the embedding capacity of this technique is not high. Baby et al. [2] proposed a data-hiding technique that utilizes the DWT for embedding the multiple color images into a single image. The secret images were embedded into three color planes of the cover images. Swain [23] proposed an adaptive PVD steganography technique. In this technique, the secret data is embedded in the block of each color plane. During the embedding process, the vertical and horizontal edges are exploited in each block. This technique works on the color plane instead of the color pixels.

Prasad and Pal [20] presented a color image steganography technique that utilizes the concept of the PVD. This technique has readjusted the overlapping blocks of the color components. The main advantages of this technique is its simplicity and is easy to implement. Muhammad et al. [17] proposed a secure image steganography technique based on the stego key-directed adaptive least significant bit (SKA-LSB) method. The stego key and secret data are encrypted using a two-level encryption and multi-level encryption algorithm, respectively. The encrypted information is embedded in the cover image using an adaptive LSB technique.

As we have seen in the study of previous works, it has been found that color image steganography algorithms are good at embedding secret messages either text or image, but there is a possibility to enhance the capacity of these techniques so that the same can carry large secret information.

3 Color Image Steganography

3.1 Contribution

Earlier the authors Kumar and Kumar [15] used these concepts for grayscale image steganography. The same concepts have been applied for color image steganography. The concepts are reproduced as follows:

There are two problems that made us introduce the concepts to yield modified algorithm for steganography. These problems are mentioned below:

  1. Kumar and Kumar [13] used the concept of error blocks for secret image embedding. They have used the two-stage matching process. Therefore, the time complexity of the steganography technique is increased.

  2. It uses only one detail coefficient block (i.e. horizontal) to embed the secret image.

  • Solution 1. Optimal block matching.

    Kumar and Kumar [13] used the two-stage matching process that utilizes the concept of error block. To reduce the time complexity, the approximation coefficient blocks of the secret image are directly matched with the detail coefficient blocks of the cover image. There is no need to compute the error blocks for further matching.

  • Solution 2. Optimal replacement block computation.

    Kumar and Kumar [13] used horizontal coefficient blocks for embedding the secret image block. In this paper, we matched the secret image blocks with three detail coefficient blocks (i.e. horizontal, vertical, and diagonal) of the color cover image. The best matched detail coefficient block is selected for embedding the secret image block. This approach greatly reduces the distortion in stego color image.

3.2 Modified Color Image Steganography Technique

The main contribution of this paper is to evaluate the performance of the modified steganography approach for the color images. The DWT is used to decompose both the cover and secret images. The technique consists of two procedures: embedding and extraction. The details of these procedures are illustrated as follows.

3.2.1 Embedding Procedure

Figure 1 shows the block diagram of the proposed embedding procedure. The color cover image is decomposed into three color planes (i.e. R, G, and B). The three color planes are further decomposed into four coefficients: approximation coefficients, horizontal detail coefficients, vertical detail coefficients, and diagonal detail coefficients using DWT. The secret image is also decomposed into four coefficients such as the approximation coefficients, horizontal detail coefficients, vertical detail coefficients, and diagonal detail coefficients using DWT. These coefficients are partitioned into non-overlapping blocks. The approximation coefficient blocks of the secret image are matched with the detail coefficients of the color planes of the cover image. The replacement of the secret blocks is done with the best matched detail coefficient block of the cover image. The inverse DWT is applied on the approximation and modified detail coefficients of the color image to obtain the stego image (ST).

Figure 1: Proposed Embedding Procedure.
Figure 1:

Proposed Embedding Procedure.

The steps of the embedding procedure are described in detail as follows:

  1. Read the cover image (C) and secret image (S). Decompose C into three planes R, G, and B.

    C{RC,GC,BC}

  2. Apply DWT on the RGB components of C and the secret image S.

    DWT(RC){RCA,RCH,RCV,RCD}

    DWT(GC){GCA,GCH,GCV,GCD}

    DWT(BC){BCA,BCH,BCV,BCD}

    DWT(S){SA,SH,SV,SD}

  3. Apply the blocking process on the approximation coefficients of the R, G, and B planes of C and the approximation coefficients of S. The approximation coefficients are decomposed into blocks of 4×4 pixels.

    SA{BSAi, 1iBSAN}

    RCA{BRCAi, 1iBRCAN}

    GCA{BGCAi, 1iBGCAN}

    BCA{BBCAi, 1iBBCAN}

  4. Apply the blocking process on the detail coefficients of the R plane of C. All of these coefficients are decomposed into blocks of 4×4 pixels.

    RCH{BRCHi, 1iBRCHN}

    RCV{BRCVi, 1iBRCVN}

    RCD{BRCDi, 1iBRCDN}

  5. Apply the blocking process on the detail coefficients of the G plane of C. All of these coefficients are decomposed into blocks of 4×4 pixels.

    GCH{BGCHi, 1iBGCHN}

    GCV{BGCVi, 1iBGCVN}

    GCD{BGCDi, 1iBGCDN}

  6. Apply the blocking process on the detail coefficients of the B plane of C. All of these coefficients are decomposed into blocks of 4×4 pixels.

    BCH{BBCHi, 1iBBCHN}

    BCV{BBCVi, 1iBBCVN}

    BCD{BBCDi, 1iBBCDN}

  7. Each block of the secret image (BSAi) is matched with the detail coefficients of the R, G, and B planes of C. The block matching is done with the root mean square error. The position of the minimum error blocks of the R, G, and B planes are stored. The position of the best matched blocks is stored in Key K1.

  8. Replace the best matched detailed coefficients of the R, G, and B planes of C with the approximation coefficients of the secret image.

  9. Apply the IDWT on the modified detailed coefficients of the R, G, and B planes of C. The stego image (ST) is produced.

3.2.2 Extraction Procedure

The block diagram of the extraction procedure is shown in Figure 2. The ST is separated into three color planes. The three color planes are further decomposed into four coefficients using the DWT. These coefficients are partitioned into non-overlapping blocks. The best matched blocks are extracted from the detailed coefficients. The secret image is generated from the extracted blocks. The extraction procedure is described in detail as follows:

  1. Decompose the ST into the three color planes, R, G, and B.

    ST{RST,GST,BST}

  2. Apply the DWT on all the three color planes R, G, and B planes of the ST.

    DWT(RST){RSTA,RSTH,RSTV,RSTD}

    DWT(GST){GSTA,GSTH,GSTV,GSTD}

    DWT(BST){BSTA,BSTH,BSTV,BSTD}

  3. Apply the blocking process on the detail coefficients of the R, G, and B planes of the ST. All of these coefficients are decomposed into blocks of 4×4 pixels.

  4. The position of the embedded blocks of the secret image is found using the Key K1. These embedded blocks are the approximation coefficients of S.

  5. Apply the IDWT on the extracted approximation blocks and detailed coefficients of S. This will produce the extracted secret image from the ST.

Figure 2: Proposed Extraction Procedure.
Figure 2:

Proposed Extraction Procedure.

4 Performance Evaluation

The performance of the proposed technique is evaluated on the different cover and secret images. The experimental results are assessed and compared with four recently developed steganography techniques.

4.1 Images Used

The performance of the proposed approach is evaluated using four color cover images and two grayscale secret images. The color images are Goldhill, Lena, Barbara, and Plane. The secret images are Cameraman and Baboon. The size of these images is 256×256. Figure 3 shows the cover images. The secret images are shown in Figure 4.

The Cameraman and Baboon images were embedded in the above-mentioned four color images. Figures 5 and 6 show the STs after embedding the Cameraman and Baboon secret images into the above-mentioned cover images, respectively, using the proposed technique. The visual quality of the STs is good.

4.2 Algorithms Involved for Comparison

In order to validate the performance of the proposed approach, it is compared with the four well-known techniques developed such as the DCT- and the DWT-based steganography technique (DCWS) [13], smart pixel adjustment based steganography technique (SPAS) [25], adaptive PVD-based steganography technique (APS) [23], and overlapping block-based PVD steganography technique (OBPS) [20]. All the above-mentioned techniques are implemented and tested on color images. PSNR is used to measure the quality of the ST and extracted secret image.

4.3 Results and Discussion

The imperceptibility of the ST and extracted secret images are evaluated using PSNR. Tables 1 and 2 depict the PSNR values of the STs after embedding Cameraman and Baboon as secret images, respectively. The experimental results reveal that the proposed approach provides better PSNR than the other four recently developed techniques. Because of the blocking concept, the proposed approach can easily embed the secret image in the matched detail wavelet coefficient blocks of the cover image compared with other techniques. The proposed approach produces least distortion in the cover image during the embedding, which is also confirmed by its high PSNR values. The proposed approach provides better quality of the ST.

Tables 3 and 4 show the PSNR values of the extracted Cameraman and Baboon secret images, respectively. The results depict that the PSNR value of the proposed approach is better than the existing techniques. The results also reveal that the proposed approach provides good imperceptibility of the extracted secret image.

5 Conclusions

A modification in the DWT-based color image steganography approach has been used. The approach uses blocking and secret key computation concepts. The blocking concept uses the least variation concept. The secret key uses the concept of the detail coefficient of the DWT and the least error matching criteria. The experimental results indicate that the modified approach provides better ST and secret images in terms of PSNR. It helps us to provide better visual quality. Moreover, this approach does not require the original cover image to extract the secret image.

Figure 3: Original Cover Images: (A) Goldhill, (B) Lena, (C) Barbara, (D) Plane.
Figure 3:

Original Cover Images: (A) Goldhill, (B) Lena, (C) Barbara, (D) Plane.

Figure 4: Original Secret Images: (A) Cameraman, (B) Baboon.
Figure 4:

Original Secret Images: (A) Cameraman, (B) Baboon.

Figure 5: STs After Embedding the Cameraman Image: (A) Goldhill, (B) Lena, (C) Barbara, (D) Plane.
Figure 5:

STs After Embedding the Cameraman Image: (A) Goldhill, (B) Lena, (C) Barbara, (D) Plane.

Figure 6: STs After Embedding the Baboon Image: (A) Goldhill, (B) Lena, (C) Barbara, (D) Plane.
Figure 6:

STs After Embedding the Baboon Image: (A) Goldhill, (B) Lena, (C) Barbara, (D) Plane.

Table 1:

PSNR Values of ST Using Cameraman as a Secret Image.

Cover imagesDCWSSPASAPSOBPSProposed
Goldhill26.800227.135527.525327.982528.2911
Lena32.998932.067133.096433.177933.2558
Barbara23.601224.568924.813725.152825.9011
Plane30.887631.213431.992132.026732.6326
Table 2:

PSNR Values of ST Using Baboon as a Secret Image.

Cover imagesDCWSSPASAPSOBPSProposed
Goldhill27.000927.879028.112828.992129.8260
Lena34.618934.708534.712334.781934.9175
Barbara26.868526.997227.019327.214327.7151
Plane32.247832.855733.156233.190833.8283
Table 3:

PSNR Values of Extracted Cameraman.

Cover imagesDCWSSPASAPSOBPSProposed
Goldhill10.554511.251211.642711.876112.0564
Lena10.247910.594110.583010.652310.7692
Barbara10.969211.147811.462811.856112.5284
Plane10.477410.556910.557210.559910.5619
Table 4:

PSNR Values of Extracted Baboon.

Cover imagesDCWSSPASAPSOBPSProposed
Goldhill10.756811.863412.382312.714213.7351
Lena10.492010.975411.385711.873512.4739
Barbara10.726710.695810.728510.731710.7329
Plane11.346611.776112.124612.549012.8437

Bibliography

[1] A. A. Abdelwahab and L. A. Hassaan, A discrete wavelet transform based technique for image data hiding, in: Proceedings of 25th National Radio Science Conference, pp. 1–9, Egypt, 2008.10.1109/NRSC.2008.4542319Search in Google Scholar

[2] D. Baby, J. Thomas, G. Augustine, E. George and N. R. Michael, A novel DWT based image securing method using steganography, Procedia Comput. Sci.46 (2015), 612–618.10.1016/j.procs.2015.02.105Search in Google Scholar

[3] Y. Bassil, Image steganography based on a parameterized canny edge detection algorithm, Int. J. Comput. Appl.60 (2012), 35–40.10.5120/9682-4112Search in Google Scholar

[4] C. K. Chan and L. M. Cheng, Hiding data in image by simple LSB substitution, Pattern Recognit.37 (2003), 469–471.10.1016/j.patcog.2003.08.007Search in Google Scholar

[5] A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, Digital image steganography: survey and analyses of current methods, Signal Process.90 (2010), 727–752.10.1016/j.sigpro.2009.08.010Search in Google Scholar

[6] W.-J. Chen, C.-C. Chang and T. H. N. Le, High payload steganography mechanism using hybrid edge detector, Expert Syst. Appl.37 (2010), 3292–3301.10.1016/j.eswa.2009.09.050Search in Google Scholar

[7] M. Ghebleh and A. Kanso, A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simult.19 (2014), 1898–1907.10.1016/j.cnsns.2013.10.014Search in Google Scholar

[8] B. L. Gunjal and S. N. Mali, MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain, SpringerPlus4 (2015), 126.10.1186/s40064-015-0904-zSearch in Google Scholar PubMed PubMed Central

[9] S. Hemalatha, U. D. Acharya, R. Adige and P. Kamath, An integer wavelet transform based steganography technique for color images, Int. J. Inf. Comput. Technol.3 (2013), 13–24.Search in Google Scholar

[10] A. Ioannidou, S. T. Halkidis and G. Stephanides, A novel technique for image steganography based on a high payload method and edge detection, Expert Syst. Appl.39 (2012), 11517–11524.10.1016/j.eswa.2012.02.106Search in Google Scholar

[11] H. R. Kanan and B. Nazeri, A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm, Expert Syst. Appl.41 (2014), 6123–6130.10.1016/j.eswa.2014.04.022Search in Google Scholar

[12] S. M. M. Karim, M. S. Rahman and M. I. Hossain, A new approach for LSB based image steganography using secret key, in: Proc. International Conference on Computer and Information Technology, pp. 286–291, Dhaka, Bangladesh, 2011.Search in Google Scholar

[13] V. Kumar and D. Kumar, Digital image Steganography based on combination of DCT and DWT, in: Information and Communication Technologies, V. V. Das and R. Vijaykumar, eds., pp. 596–601, Springer, 2010.10.1007/978-3-642-15766-0_102Search in Google Scholar

[14] D. Kumar and V. Kumar, Improving the performance of color image watermarking using contourlet transform, in: Advances in Computer Science and Information Technology, N. Meghanathan, B. K. Kaushik and D. Nagamalai, eds., pp. 256–264, Springer-Verlag, Berlin, 2011.10.1007/978-3-642-17857-3_26Search in Google Scholar

[15] V. Kumar and D. Kumar, A modified DWT-based image steganography technique, Multimed. Tools Appl. 2017, In Press.10.1007/s11042-017-4947-8Search in Google Scholar

[16] R. T. McKeon, Strange Fourier steganography in movies, In: Proc. IEEE International Conference on Electro/Information Technology, pp. 178–182, 2007.10.1109/EIT.2007.4374540Search in Google Scholar

[17] K. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan and M. Sajjad, CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method, Multimed. Tools Appl. 76 (2017), 8597–8626.10.1007/s11042-016-3383-5Search in Google Scholar

[18] D. Ou and W. Sun, High payload image Steganography with minimum distortion based on absolute moment block truncation coding, Multimed. Tools Appl.74 (2015), 9117–9139.10.1007/s11042-014-2059-2Search in Google Scholar

[19] J. S. Pan, W. Li, C. S. Yang and L. J. Yan, Image Steganography based on subsampling and compressive sensing, Multimed. Tools Appl.74 (2015), 9191–9205.10.1007/s11042-014-2076-1Search in Google Scholar

[20] S. Prasad and A. K. Pal, An RGB color image steganography scheme using overlapping block-based pixel value differencing, R. Soc. Open Sci.4 (2017), 161066.10.1098/rsos.161066Search in Google Scholar PubMed PubMed Central

[21] S. Rubab and M. Younus, Improved image steganography technique for colored images using wavelet transform, Int. J. Comput. Appl.39 (2012), 29–32.10.5120/4890-7381Search in Google Scholar

[22] A. A. Shejul and U. L. Kulkarni, A secure skin tone based steganography (SSTS) using wavelet transform, Int. J. Comput. Theory Eng.3 (2011), 16–22.10.7763/IJCTE.2011.V3.277Search in Google Scholar

[23] G. Swain, Adaptive pixel value differencing steganography using both vertical and horizontal edges, Multimed. Tools Appl.75 (2016), 541–556.10.1007/s11042-015-2937-2Search in Google Scholar

[24] D.-C. Wu and W.-H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognit. Lett.24 (2003), 1613–1626.10.1016/S0167-8655(02)00402-6Search in Google Scholar

[25] C.-Y. Yang and W.-F. Wang, Block based color image steganography using smart pixel-adjustment, Adv. Intell. Syst. Comput.329 (2015), 145–154.10.1007/978-3-319-12286-1_15Search in Google Scholar

Received: 2017-04-05
Published Online: 2017-10-14

©2019 Walter de Gruyter GmbH, Berlin/Boston

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Articles in the same Issue

  1. Frontmatter
  2. Precursor Selection for Sol–Gel Synthesis of Titanium Carbide Nanopowders by a New Cubic Fuzzy Multi-Attribute Group Decision-Making Model
  3. Modified and Optimized Method for Segmenting Pulmonary Parenchyma in CT Lung Images, Based on Fractional Calculus and Natural Selection
  4. PCI-PSO: Preference-Based Component Identification Using Particle Swarm Optimization
  5. Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform
  6. Pythagorean Hesitant Fuzzy Hamacher Aggregation Operators in Multiple-Attribute Decision Making
  7. Mitral Regurgitation Severity Analysis Based on Features and Optimal HE (OHE) with Quantification using PISA Method
  8. Non-dominated Sorting Genetic Algorithms for a Multi-objective Resource Constraint Project Scheduling Problem
  9. Substation Equipment 3D Identification Based on KNN Classification of Subspace Feature Vector
  10. Mathematical Model Using Soft Computing Techniques for Different Thermal Insulation Materials
  11. Prediction Method of Railway Freight Volume Based on Genetic Algorithm Improved General Regression Neural Network
  12. Tree Physiology Optimization in Benchmark Function and Traveling Salesman Problem
  13. Design and Development of a Multiobjective Cost Function for Robust Video Watermarking Using Wavelet Transform
  14. Forecasting Air Quality Index Using an Ensemble of Artificial Neural Networks and Regression Models
  15. Particle Swarm Optimization-Enhanced Twin Support Vector Regression for Wind Speed Forecasting
Downloaded on 30.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2017-0134/html?lang=en
Scroll to top button