Results 31 to 40 of about 979 (187)

An Improved Privacy Protection Algorithm for Multimodal Data Fusion

open access: yesScientific Programming, Volume 2022, Issue 1, 2022., 2022
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits.
Z. F. Chen   +6 more
wiley   +1 more source

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: yes, 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad   +2 more
core   +2 more sources

Performance of a large limited streamer tube cell in drift mode [PDF]

open access: yes, 2001
The performance of a large (3x3 $cm^2$) streamer tube cell in drift mode is shown. The detector space resolution has been studied using cosmic muons crossing an high precision silicon telescope.
Ahlen   +11 more
core   +3 more sources

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley   +1 more source

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao   +5 more
wiley   +1 more source

Muon Energy Estimate Through Multiple Scattering with the Macro Detector [PDF]

open access: yes, 2002
Muon energy measurement represents an important issue for any experiment addressing neutrino induced upgoing muon studies. Since the neutrino oscillation probability depends on the neutrino energy, a measurement of the muon energy adds an important piece
A. Baldini   +131 more
core   +2 more sources

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

A New Torque Control System of Permanent Magnet Synchronous Motor [PDF]

open access: yes, 2006
The article describes a new approach to control of permanent magnet synchronous motor drive based on the analysis of the electromechanical transformation. The proposed control system provides quick response and low ripple of the motor torque and flux. To
Batzel   +10 more
core   +1 more source

A NOVEL DESIGN OF 17.5 KV HV FEEDTHROUGH FOR ARJUNA 2.0 [PDF]

open access: yes, 2021
A NOVEL DESIGN OF 17.5 KV HV FEEDTHROUGH FOR ARJUNA 2.0. A novel design of the 17.5 kV feedthrough for Arjuna 2.0 Cockcroft Walton generator has been proposed.
Adabiah, Suhadah Rabi’atul   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy