Login / Signup

Encryption technique based on fuzzy neural network hiding module and effective distortion method.

Muhammed Jassem Al-MuhammedAhmad Al-Daraiseh
Published in: Neural Comput. Appl. (2022)
Keyphrases
  • fuzzy neural network
  • optimization algorithm
  • support vector machine svm
  • clustering method
  • genetic algorithm
  • feature extraction
  • prior knowledge
  • input output
  • basis functions