Results 41 to 50 of about 957 (173)

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

FORMATION OF MIXED AGRO-PHYTOCENOSES OF ALFERA AND CONCEPT IN THE FIRST YEAR OF VEGETATION [PDF]

open access: yesVolga Region Farmland, 2020
The studies were carried out on the experimental field of the Penza Agricultural Institute, a branch of the Federal State-Funded Scientific Institution Federal Scientific Center of Fibre Crops in 2017-2019. The purpose of the research is to theoretically
O.A. Timoshkin   +3 more
doaj   +1 more source

Coverless Information Hiding Method Based on Web Text

open access: yesIEEE Access, 2019
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long   +4 more
doaj   +1 more source

Container Ship Accident Analysis due to Container Stacked on Deck as an Attempt to Improve Maritime Logistic System [PDF]

open access: yesE3S Web of Conferences, 2019
This paper analyses factors that might cause accidents to the container ships due to containers stacked on deck, and propose applicable actions to minimize these factors.
Priapalla Rahim Gafero, Sunaryo
doaj   +1 more source

A portable audio/video recorder for longitudinal study of child development [PDF]

open access: yes, 2012
Collection and analysis of ultra-dense, longitudinal observational data of child behavior in natural, ecologically valid, non-laboratory settings holds significant promise for advancing the understanding of child development and developmental disorders ...
Goodwin, Matthew   +3 more
core   +3 more sources

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

STBS-Stega: Coverless text steganography based on state transition-binary sequence

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu   +6 more
doaj   +1 more source

A conceptual integration approach to the property word nagy ‘big’ [PDF]

open access: yes, 2010
This paper describes the various readings of the typically size-related Hungarian adjective nagy ‘big’ in combination with the corresponding noun readings in a corpus-based analysis. Adjective-noun combinations have not only attracted the attention of
Papp, Kornélia
core   +1 more source

A Coverless Plain Text Steganography Based on Character Features

open access: yesIEEE Access, 2019
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj   +1 more source

Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]

open access: yes, 2018
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy