Results 51 to 60 of about 957 (173)

C-HIDE: A Steganographic Framework for Robust Data Hiding and Advanced Security Using Coverless Hybrid Image Encryption With AES and ECC

open access: yesIEEE Access
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman   +5 more
doaj   +1 more source

Heat Transfer Calculations in Barrel Cover of 35 mm Naval Armament System Gun [PDF]

open access: yesProblemy Mechatroniki, 2018
This paper presents the results of numerical simulations of non-stationary heat transfer in a 35 mm anti-air gun barrel cover made of composite materials. The cover protects the gun against weather conditions, including sea water effects, and serves as a
Zbigniew LECIEJEWSKI   +5 more
doaj   +1 more source

From the History of a Book to a "History of the Book" [PDF]

open access: yes, 2009
English and American Literature and ...
Price, Leah
core   +1 more source

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

Text coverless information hiding method based on synonyms expansion and label delivery mechanism

open access: yesTongxin xuebao, 2021
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Zhen ZHANG   +5 more
doaj   +2 more sources

Semiconductor projectile impact detector [PDF]

open access: yes, 1977
A semiconductor projectile impact detector is described for use in determining micrometeorite presence, as well as its flux and energy comprising a photovoltaic cell which generates a voltage according to the light and heat emitted by the micrometeorites
Shriver, E. L.
core   +1 more source

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu   +4 more
wiley   +1 more source

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

An Adaptive Audio Steganography for Covert Wireless Communication

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
In recent years, the wide applications of the wireless sensor networks have achieved great success. However, the security is a critical issue in many scenarios ranging from covert military operations to the organization of the social unrest. Because the traditional encrypting methods are easy to arouse suspicion, an adaptive audio steganography method ...
Guojiang Xin   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy