Real-time water quality monitoring using Internet of Things in SCADA

K Saravanan, E Anusuya, R Kumar, LH Son - … monitoring and assessment, 2018‏ - Springer
Water pollution is the root cause for many diseases in the world. It is necessary to measure
water quality using sensors for prevention of water pollution. However, the related works …

Optimized multimedia data through computationally intelligent algorithms

N Sharma, C Chakraborty, R Kumar - Multimedia Systems, 2023‏ - Springer
In the field of data exchange, the security of information is the critical aspect. This void in the
security helped the evolution of steganography to address the problem of security …

A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks

T Khan, K Singh, M Abdel-Basset, HV Long… - Ieee …, 2019‏ - ieeexplore.ieee.org
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …

Image data hiding schemes based on metaheuristic optimization: a review

A Melman, O Evsutin - Artificial Intelligence Review, 2023‏ - Springer
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …

A new fusion of salp swarm with sine cosine for optimization of non-linear functions

N Singh, LH Son, F Chiclana, JP Magnot - Engineering with Computers, 2020‏ - Springer
The foremost objective of this article is to develop a novel hybrid powerful meta-heuristic that
integrates the salp swarm algorithm with sine cosine algorithm (called HSSASCA) for …

An optimized steganography hiding capacity and imperceptibly using genetic algorithms

R Wazirali, W Alasmary, MMEA Mahmoud… - IEEE Access, 2019‏ - ieeexplore.ieee.org
In stenography, embedding data within an image has a trade-off between image quality and
embedding capacity. Specifically, the more data are concealed within a carrier image, the …

Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain

A Melman, O Evsutin - Applied Soft Computing, 2023‏ - Elsevier
Image steganography and watermarking have demonstrated their efficiency in creating a
covert communication channel and in digital image authentication respectively. The …

Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography

S Pramanik, RP Singh, R Ghosh - Multimedia Tools and Applications, 2020‏ - Springer
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021‏ - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks

YH Robinson, EG Julie, R Kumar, LH Son - Peer-to-Peer Networking and …, 2019‏ - Springer
In this paper, we propose a new power-aware routing protocol for Wireless Sensor Network
(WSN) based on the threshold rate and fuzzy logic for improving energy efficiency. The …