2022
DOI: 10.1016/j.csite.2022.102379
|View full text |Cite
|
Sign up to set email alerts
|

Forecasting the influence of the guided flame on the combustibility of timber species using artificial intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 46 publications
0
14
0
Order By: Relevance
“…The process of hiding the SM in the CI should not affect the CI negatively so that no change is observed on the stego_image with the naked eye, and accordingly, the quality of the stego_image must be very high so that the mean square error (MSE) between the covering and the stego images must be very low, at the same time peak signal to noise ratio (PSNR) between them must very high [20][21][22][23][24][25][26][27][28][29][30]. A good method of SM steganography must satisfy the quality requirements listed in table 4), these changes cannot be noticed by human eyes, and this will be reflected on the values of MSE and PSNR, making the SI closed to the CI [31][32][33][34][35][36][37][38][39][40].…”
Section: Figure 3: Lsm Sm Hidingmentioning
confidence: 99%
See 1 more Smart Citation
“…The process of hiding the SM in the CI should not affect the CI negatively so that no change is observed on the stego_image with the naked eye, and accordingly, the quality of the stego_image must be very high so that the mean square error (MSE) between the covering and the stego images must be very low, at the same time peak signal to noise ratio (PSNR) between them must very high [20][21][22][23][24][25][26][27][28][29][30]. A good method of SM steganography must satisfy the quality requirements listed in table 4), these changes cannot be noticed by human eyes, and this will be reflected on the values of MSE and PSNR, making the SI closed to the CI [31][32][33][34][35][36][37][38][39][40].…”
Section: Figure 3: Lsm Sm Hidingmentioning
confidence: 99%
“…-Digital image usually has a huge capable to hold short and long secret messages [40][41][42][43][44].…”
Section: Introductionmentioning
confidence: 99%
“…Messages may be private or secret, thus they require a high level of protection when using unsecure communication environment [22][23][24][25][26]. One of the most popular techniques to protect the secret messages is data cryptography, which means encrypting the message before sending it and decrypting the message after receiving it.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the server can store your message history, connect additional conversation participants via alternate channels (such as joining a video conference call), use automatic moderation, and so on [35][36][37][38][39][40]. Messages may be private or secret, thus they require a high level of protection when using unsecure communication environment [22][23][24][25][26]. One of the most popular techniques to protect the secret messages is data cryptography, which means encrypting the message before sending it and decrypting the message after receiving it.…”
Section: Introductionmentioning
confidence: 99%