The channel could be evaluated by utilizing several estimation algorithms. The various patterns of pilot arrangements for the channel appreciation are a huge problem in channel appreciation techniques since all the processes depends on it; this paper discusses improvements in channel selection. The Least Square and Least Square Mean methods are common, simple ways to begin to estimate a channel; however, they are less efficient than more complex approaches. Due to the boost in demand with high data rates in communications, developers continue to invent new methods and mechanisms to adjust the capacity and the accuracy of the communication network. One of the primary troubles in wireless communication is the communication channel, which is affected by nonlinear and random noise sources, which decrease the quality of the service on the network; in this case, the channel must be equalized to increase performance with minimal error. In this paper, a Massive Multiple Input Multiple Output was designed and simulated in order to estimate the channel and the performance of the network through using Least Square and Least Square Mean.
With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became easy to attack. In this newspaper, we suggest amodel to Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain. The analysis and evaluate the performance of this model ismeasured by testing several parameters. Show The resulting multimedia is found to be more distorted in hybrid Cipher.
Abstract:The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this method over other security methods is hiding existence of data using carrier to hold this data embedding inside it. Image-based information hiding represents one of widely used hiding methods due to the image capability of holding large amount of data as well as its resistance to detectable distortion. In last decades, statistical methods (types of stego-analysis methods) are used to detect existing of hidden data. Therefore, areas that have color variation (edges area) are used to hide data instead of smooth areas. In this paper, Corners points are proposed to hide data instead of edges, this to avoid statistical attacks that are used to expose hidden message. Additionally, this paper proposes clearing least significant bit (CLSB) method to retrieve data from stego-image without sending pixels' map; this will increase security of the proposed cornerbased hiding method. Experimental results show that the proposed method is robust against statistical attacks compared with edge-and sequential-based hiding methods. SVM classifier also confirms the outperformance of the proposed method over the previous methods by using Corel-1000 image dataset.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.