Login / Signup
Encryption technique based on fuzzy neural network hiding module and effective distortion method.
Muhammed Jassem Al-Muhammed
Ahmad Al-Daraiseh
Published in:
Neural Comput. Appl. (2022)
Keyphrases
</>
fuzzy neural network
optimization algorithm
support vector machine svm
clustering method
genetic algorithm
feature extraction
prior knowledge
input output
basis functions