Results 81 to 90 of about 957 (173)
An Electronic Lattice Construction Method Based on Game Padding
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj +1 more source
Coverless Information Hiding Based onDeep Learning Approach:Review
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential ...
Zainab Hdeib Al-Shably +1 more
openaire +1 more source
Deep Learning-Based Coverless Image Steganography on Medical Images Shared via Cloud
Coverless image steganography is an approach for creating images with intrinsic colour and texture information that contain hidden secret information. Recently, generative adversarial networks’ (GANs) deep learning transformers have been used to generate
Ambika +2 more
doaj +1 more source
Coverless Information Hiding Based on Generative adversarial networks
arXiv admin note: text overlap with arXiv:1703.05502 by other ...
Liu, Ming-ming +4 more
openaire +2 more sources
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. Since its inception in the 1990s till the present, digital steganography has a lengthy history.
Rosshini Selvamani, Yusliza Yusoff
doaj +1 more source
Stent Graft Placement for Injured Visceral Artery. [PDF]
Miyayama S +7 more
europepmc +1 more source
A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core +2 more sources
The influence of sex difference on behavior and adult hippocampal neurogenesis in C57BL/6 mice. [PDF]
Tsao CH +4 more
europepmc +1 more source
The COVerLeSS project (Corpus Online del Verismo tra Letteratura, Storia e SocietĂ ) explores Italian Verismo within the field of Periodical Studies, drawing on ongoing digitization and preservation initiatives in libraries and cultural institutions ...
Denise Bruno +5 more
doaj +1 more source
Student newspaper for Central Washington University for May 5, 1949https://digitalcommons.cwu.edu/cwu_student_newspaper/1621/thumbnail ...
Central Washington University
core +1 more source

