Results 81 to 90 of about 979 (187)

Generative steganography method based on auto-generation of contours

open access: yesTongxin xuebao, 2021
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU   +4 more
doaj   +2 more sources

Overview of some commercially important marine demersal fishes and fishery regulations [PDF]

open access: yes, 2018
Global total capture fishery production in 2014 was 93.4 million tonnes, of which 81.5 million tonnes from marine waters and 11.9 million tonnes from inland waters.
Nair, Rekha J
core  

Coverless information hiding based on Generative Model

open access: yes, 2018
4 pages,7 ...
Duan, Xintao, Song, Haoxian
openaire   +2 more sources

A Robust joint coverless image steganography scheme based on two independent modules

open access: yesCybersecurity
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj   +1 more source

IMPROVED COVERLESS INFORMATION HIDING UTILIZING GENERATIVE MODELS

open access: yesMağallaẗ Al-kūfaẗ Al-handasiyyaẗ
The submitted algorithm increased data-hiding capacity, extended capability, and improved quality of the reconstructed secret image as compared with traditional steganography and existing coverless information-hiding methods.
Zainab Hdeib Al-Shably
doaj   +1 more source

Coverless Video Steganography based on Maximum DC Coefficients

open access: yes, 2020
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin   +4 more
openaire   +2 more sources

Coverless Steganography for Face Recognition Based on Diffusion Model

open access: yesIEEE Access
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj   +1 more source

Reading the works of Verism through the magazines and critics of XIXth century. Text editions, lexical maps and thematic dictionaries in a user-oriented portal

open access: yesUmanistica Digitale
The COVerLeSS project (Corpus Online del Verismo tra Letteratura, Storia e Società) explores Italian Verismo within the field of Periodical Studies, drawing on ongoing digitization and preservation initiatives in libraries and cultural institutions ...
Denise Bruno   +5 more
doaj   +1 more source

Campus Crier [PDF]

open access: yes, 1949
Student newspaper for Central Washington University for May 5, 1949https://digitalcommons.cwu.edu/cwu_student_newspaper/1621/thumbnail ...
Central Washington University
core   +1 more source

Home - About - Disclaimer - Privacy