Results 1 to 10 of about 979 (187)

Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]

open access: yes, 2018
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core   +2 more sources

An Electronic Lattice Construction Method Based on Game Padding

open access: yesIEEE Access, 2019
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj   +1 more source

Coverless Information Hiding Based onDeep Learning Approach:Review

open access: yesAl-Furat Journal of Innovations in Electronics and Computer Engineering
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential ...
Zainab Hdeib Al-Shably   +1 more
openaire   +1 more source

Rarity types among plant species with high conservation priority in Switzerland [PDF]

open access: yes, 2018
.: Broennimann O., Vittoz P., Moser D. and Guisan A. 2005. Rarity types among plant species with high conservation priority in Switzerland. Bot. Helv. 115: 95-108.
Broennimann, Olivier   +3 more
core  

Deep Learning-Based Coverless Image Steganography on Medical Images Shared via Cloud

open access: yesEngineering Proceedings
Coverless image steganography is an approach for creating images with intrinsic colour and texture information that contain hidden secret information. Recently, generative adversarial networks’ (GANs) deep learning transformers have been used to generate
Ambika   +2 more
doaj   +1 more source

The Islam-oriented House Structure in Kano: a Vanishing Heritage in Modern City Composition [PDF]

open access: yes, 2012
He debut of colonialism along with the consequent de facto supremacy of the Western world did not onlynegatively impact on the economy and polity of the Muslim world.
Yahya, A. (Ahmad)
core   +1 more source

Coverless Information Hiding Based on Generative adversarial networks

open access: yes, 2017
arXiv admin note: text overlap with arXiv:1703.05502 by other ...
Liu, Ming-ming   +4 more
openaire   +2 more sources

Effectiveness of the Spatial Domain Techniques in Digital Image Steganography

open access: yesQubahan Academic Journal
Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. Since its inception in the 1990s till the present, digital steganography has a lengthy history.
Rosshini Selvamani, Yusliza Yusoff
doaj   +1 more source

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

Stent Graft Placement for Injured Visceral Artery. [PDF]

open access: yesInterv Radiol (Higashimatsuyama), 2023
Miyayama S   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy