Results 61 to 70 of about 5,757 (274)
Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text.
Manjunath, Naidele Katrumane
core +1 more source
Memristive Physical Reservoir Computing
Memristors’ nonlinear dynamics and input‐dependent memory effects make them ideal candidates for high‐performance physical reservoir computing (RC). Based on their conductance modulation, memristors can be classified as electronic or optoelectronic types.
Dian Jiao +9 more
wiley +1 more source
Various audio Steganography techniques for audio signals
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats.
openaire +1 more source
Robust and secure systems for audio signals
Audio steganography is considered a crucial technique for bolstering information security. It is used to hide sensitive data within an audio signal. This paper presents two robust techniques for audio steganography, which embed secret images within the ...
Marwa A. Nasr +5 more
doaj +1 more source
Exosomes are emerging as powerful biomarkers for disease diagnosis and monitoring. This review highlights the integration of surface‐enhanced Raman spectroscopy with artificial intelligence to enhance molecular fingerprinting of exosomes. Machine learning and deep learning techniques improve spectral interpretation, enabling accurate classification of ...
Munevver Akdeniz +2 more
wiley +1 more source
Audio-in-Image Steganography Using Analysis and Resynthesis Sound Spectrograph
Steganography is the practice of concealing secret information within a non-secret medium, such as an image or audio file, to prevent detection by unauthorised observers.
A. Aravind Krishnan +3 more
doaj +1 more source
Memristors based on trimethylsulfonium (phenanthroline)tetraiodobismuthate have been utilised as a nonlinear node in a delayed feedback reservoir. This system allowed an efficient classification of acoustic signals, namely differentiation of vocalisation of the brushtail possum (Trichosurus vulpecula).
Ewelina Cechosz +4 more
wiley +1 more source
A Survey on different techniques of steganography
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is
Kaur Harpreet, Rani Jyoti
doaj +1 more source
A Modified Approch Audio Stagnography Based On Technique LSB Coding [PDF]
Information security is becoming very important part of our life now-a-days. Information hiding is the fundamental of information security. Information hiding can be achieved by steganography as well.
chandel, M. G. (Mr) +2 more
core
Towards Steganography Detection Through Network Traffic Visualisation
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz +2 more
core +1 more source

