Claim Missing Document
Check
Articles

Found 2 Documents
Search

k-dStHash tree for indexing big spatio-temporal datasets Hooda, Meenakshi; Gill, Sumeet
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp2937-2944

Abstract

Today’s era is witness of tremendous ever growing spatial, temporal and spatiotemporal data. The huge spatio-temporal data immensely pushes the need for design and development of novel methods tailored for indexing spatio-temporal data. In this research paper, we propose the design of a novel spatio-temporal data indexing method, named as k-dStHash. We have proposed the algorithm k-dStHashInsertion for inserting spatio-temporal objects and an algorithm k-dStHashSrchPlaceTime has been used to search for the objects at given location and time. It is able to handle datasets with duplicate keys which has been ignored in many research works. Though the algorithm k-dStHashInsertion takes 1.3-1.5 times longer time to insert data in k-dStHash data structure as it needs to find a specific location to organize data efficiently, but when it comes to search for required records it is even more than 90 times faster when analyzed in comparison to brute force method. It is generalized enough to organize any kind of k-dimensional data and time-based data also including object finding, fleet management, clustering, leader identification, nearest neighbor, human/animal tracking, path finding and many more.
A novel RGB image steganography algorithm using type-1 fuzzy logic Dhaka, Navita; Hooda, Meenakshi; Yadav, Vinita; Gill, Sumeet
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp123-133

Abstract

Steganography aims to conceal secret data within images without affecting image quality. Traditional methods often struggle with balancing simplicity, effectiveness and payload capacity while maintaining imperceptibility. Proposed algorithm: the paper proposed a novel steganographic mshEdgeRGB_T1 algorithm that combines Mamdani fuzzy type-1 logic with the least significant bit (LSB) method. The LSB method is chosen for its simplicity and effectiveness in hiding messages. The mshEdgeRGB_T1 algorithm focuses on embedding secret messages in edge pixels, detecting more edge pixels compared to other methods, thus increasing payload capacity. Findings: the algorithm’s performance is evaluated using metrics such as peak signal-to-noise ratio (PSNR), mean squared error (MSE) and histogram analysis to measure the similarity between the cover and Stego images, quantifying the level of imperceptibility. Experimental analysis demonstrates that the mshEdgeRGB_T1 algorithm offers improved payload capacity, enhanced security and reduced imperceptibility compared to many existing methods. Conclusion: the proposed mshEdgeRGB_T1 algorithm effectively balances simplicity, payload capacity and image quality, making it a better use for image steganography.