Results 11 to 20 of about 957 (173)
Coverless Steganography Based on Motion Analysis of Video [PDF]
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed.
Yun Tan +4 more
openaire +2 more sources
Coverless Video Steganography Based on Audio and Frame Features
The coverless steganography based on video has become a research hot spot recently. However, the existing schemes usually hide secret information based on the single-frame feature of video and do not take advantage of other rich features. In this work, we propose a novel coverless steganography, which makes full use of the audio and frame image ...
Chunhu Zhang +3 more
openaire +2 more sources
UV Resistance of bacteria from the Kenyan Marine cyanobacterium Moorea producens. [PDF]
The study has established UV resistance in bacteria from the marine cyanobacterium Moorea producens with Bacillus licheniformis reported as being UV resistant for the first time. The order of taxon resistance was as follows: Bacilli strains > γ‐proteobacteria > Actinobacteria.
Dzeha T +6 more
europepmc +2 more sources
Source activity correlation effects on LCMV beamformers in a realistic measurement environment. [PDF]
In EEG and MEG studies on brain functional connectivity and source interactions can be performed at sensor or source level. Beamformers are well‐established source‐localization tools for MEG/EEG signals, being employed in source connectivity studies both in time and frequency domain.
Belardinelli P, Ortiz E, Braun C.
europepmc +2 more sources
Hyper Coupled Map Lattices for Hiding Multiple Images
The concept of a hyper coupled map lattice (CML) is presented in this paper. The complexity of the lattice is increased not by adding another spatial dimension of the lattice but by replacing scalar nodal variables by multidimensional square matrices of iterative variables.
Rasa Smidtaite +4 more
wiley +1 more source
Abstract Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image‐based information hiding has been a significantly important topic for digital forensics. Here, active image deep steganographic approaches have come forward for hiding data.
Abdullah Ayub Khan +6 more
wiley +1 more source
A Novel Coverless Text Steganographic Algorithm Based on Polynomial Encryption
Aiming at the problems of low text utilization rate and ambiguity of secret information extraction in the “tag + keyword” coverless information hiding methods, we propose a coverless information hiding method of Chinese text based on polynomial encryption in this paper.
Bo Guan +3 more
wiley +1 more source
[Retracted] A Review of Motion Vector‐Based Video Steganography
Steganography is a popular research direction in the field of information security. Due to the widespread use of video media, video steganography has received much attention from the research community. Among video steganography, motion vector (MV)‐based video steganography has become one of the critical concerns of researchers due to its large ...
Jun Li +4 more
wiley +1 more source
Steganographic secret sharing via AI-generated photorealistic images
Steganographic secret sharing is an access control technique that transforms a secret message into multiple shares in a steganographic sense. Each share is in a human-readable format in order to dispel suspicion from a malicious party during transmission
Kai Gao +3 more
doaj +1 more source
An Improved Privacy Protection Algorithm for Multimodal Data Fusion
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits.
Z. F. Chen +6 more
wiley +1 more source

