Results 81 to 90 of about 957 (173)

An Electronic Lattice Construction Method Based on Game Padding

open access: yesIEEE Access, 2019
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj   +1 more source

Coverless Information Hiding Based onDeep Learning Approach:Review

open access: yesAl-Furat Journal of Innovations in Electronics and Computer Engineering
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential ...
Zainab Hdeib Al-Shably   +1 more
openaire   +1 more source

Deep Learning-Based Coverless Image Steganography on Medical Images Shared via Cloud

open access: yesEngineering Proceedings
Coverless image steganography is an approach for creating images with intrinsic colour and texture information that contain hidden secret information. Recently, generative adversarial networks’ (GANs) deep learning transformers have been used to generate
Ambika   +2 more
doaj   +1 more source

Coverless Information Hiding Based on Generative adversarial networks

open access: yes, 2017
arXiv admin note: text overlap with arXiv:1703.05502 by other ...
Liu, Ming-ming   +4 more
openaire   +2 more sources

Effectiveness of the Spatial Domain Techniques in Digital Image Steganography

open access: yesQubahan Academic Journal
Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. Since its inception in the 1990s till the present, digital steganography has a lengthy history.
Rosshini Selvamani, Yusliza Yusoff
doaj   +1 more source

Stent Graft Placement for Injured Visceral Artery. [PDF]

open access: yesInterv Radiol (Higashimatsuyama), 2023
Miyayama S   +7 more
europepmc   +1 more source

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

Reading the works of Verism through the magazines and critics of XIXth century. Text editions, lexical maps and thematic dictionaries in a user-oriented portal

open access: yesUmanistica Digitale
The COVerLeSS project (Corpus Online del Verismo tra Letteratura, Storia e SocietĂ ) explores Italian Verismo within the field of Periodical Studies, drawing on ongoing digitization and preservation initiatives in libraries and cultural institutions ...
Denise Bruno   +5 more
doaj   +1 more source

Campus Crier [PDF]

open access: yes, 1949
Student newspaper for Central Washington University for May 5, 1949https://digitalcommons.cwu.edu/cwu_student_newspaper/1621/thumbnail ...
Central Washington University
core   +1 more source

Home - About - Disclaimer - Privacy