Results 31 to 40 of about 38,413 (310)

Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance

open access: yesIEEE Access, 2020
Information hiding is an important technique for information security, which is wildly studied by researchers. Recently embedding methods are proposed in spatial, frequency and other domains.
Yu Zhang   +4 more
doaj   +1 more source

Hiding data in halftone image using modified data hiding error diffusion [PDF]

open access: yesSPIE Proceedings, 2000
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none can be applied to halftone images. In this paper, we proposed a novel data hiding method, Modified Data Hiding Ordered Dithering (MDHED ...
Ming S. Fu, Oscar C. L. Au
openaire   +1 more source

Data hiding by using AES Algorithm

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchange the data over the internet network is very important issue. So, in order to transfer the data securely to
Prof. Dr.Rafidah Mohamad
doaj   +1 more source

Reduction of the Accompanying Noise when Hidding in an Audio File [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2008
The stereography which used to hide certain information using a host file is a science and an art. Such practice is usually done to keep away any thought in the presence of a hidden message in the host.
Radwan Al-Jawadi, Adel Issa
doaj   +1 more source

Hiding Quantum Data

open access: yesFoundations of Physics, 2003
Recent work has shown how to use the laws of quantum mechanics to keep classical and quantum bits secret in a number of different circumstances. Among the examples are private quantum channels, quantum secret sharing and quantum data hiding. In this paper we show that a method for keeping two classical bits hidden in any such scenario can be used to ...
DiVincenzo, David P.   +2 more
openaire   +2 more sources

Exercise Interventions in Children, Adolescents and Young Adults With Paediatric Bone Tumours—A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser   +5 more
wiley   +1 more source

Survey on Data Hiding Based on Block Truncation Coding

open access: yesApplied Sciences, 2021
Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention.
Cheonshik Kim   +3 more
doaj   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Knowledge hiding and individual task performance: The role of individual creativity as mediator

open access: yesHeliyon, 2023
This study investigates the association of knowledge hiding with individual task performance and the mediation role of individual creativity. It focuses on how employees' knowledge-hiding behavior can influence their task performance and how individual ...
Ika Atma Kurniawanti   +3 more
doaj   +1 more source

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy