Results 271 to 280 of about 38,413 (310)
Some of the next articles are maybe not open access.
An overview of real‐world data sources for oncology and considerations for research
Ca-A Cancer Journal for Clinicians, 2022Lynne Penberthy +2 more
exaly
2003
Virtually all sophisticated steganographic methods hide a message by embedding it as low-level noise in an image or audio file which then becomes the cover file. This approach has two disadvantages: the information hiding capacity of a cover file is small, so a large cover file is needed to hide a substantial amount of data; and once data are hidden in
openaire +1 more source
Virtually all sophisticated steganographic methods hide a message by embedding it as low-level noise in an image or audio file which then becomes the cover file. This approach has two disadvantages: the information hiding capacity of a cover file is small, so a large cover file is needed to hide a substantial amount of data; and once data are hidden in
openaire +1 more source
2003
Today, in the digital age, any type of data, such as text, images, and audio, can be digitized, stored indefinitely, and transmitted at high speeds. Notwithstanding these advantages, digital data also have a downside. They are easy to access illegally, tamper with, and copy for purposes of copyright violation.
openaire +1 more source
Today, in the digital age, any type of data, such as text, images, and audio, can be digitized, stored indefinitely, and transmitted at high speeds. Notwithstanding these advantages, digital data also have a downside. They are easy to access illegally, tamper with, and copy for purposes of copyright violation.
openaire +1 more source
Innovations in research and clinical care using patient‐generated health data
Ca-A Cancer Journal for Clinicians, 2020H S L Jim +2 more
exaly
Data Security Using Data Hiding
International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007), 2007S.K. Moon, R.S. Kawitkar
openaire +1 more source

