Results 51 to 60 of about 320,607 (275)

Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images

open access: yesCybersecurity
The rapid growth of Information and communication technology not only has positive impacts but also unveils opportunities for data and information security threats.
Aulia Arham, Hanung Adi Nugroho
doaj   +1 more source

Re‐Awakening Public Attention to the Silent Pandemic of Cancer Among Older Adults in Low‐ and Middle‐Income Countries

open access: yesAging and Cancer, EarlyView.
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef   +2 more
wiley   +1 more source

Impostor leader and knowledge hiding: Attachment avoidance as underlying mechanism

open access: yesActa Psychologica
Impostorism and knowledge-hiding behaviors negatively impact employees and organizational performance. This study examines the association between impostor leaders and knowledge hiding (evasive hiding, playing dumb, and rationalized hiding).
Laibin Wang   +3 more
doaj   +1 more source

Evaluation of a novel EHR sidecar application to display RA clinical outcomes during clinic visits: results of a stepped‐wedge cluster randomized pragmatic trial

open access: yesArthritis Care &Research, Accepted Article.
Objective We developed a novel EHR sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk   +16 more
wiley   +1 more source

Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]

open access: yes, 2012
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel   +1 more
core  

Formal and informal social care in people with Rheumatic and Musculoskeletal diseases: a cross‐sectional multicentre survey

open access: yesArthritis Care &Research, Accepted Article.
Introduction Rheumatic and musculoskeletal diseases(RMDs) are leading causes of physical disability, necessitating support with activities of daily living(ADLs). This study describes social care received by patients with RMDs in two disperate regions of England: Salford(urban) and Norfolk(rural).
Mehreen Somro   +6 more
wiley   +1 more source

Private states, quantum data hiding and the swapping of perfect secrecy

open access: yes, 2017
We derive a formal connection between quantum data hiding and quantum privacy, confirming the intuition behind the construction of bound entangled states from which secret bits can be extracted. We present three main results.
Christandl, Matthias, Ferrara, Roberto
core   +1 more source

What Do Large Language Models Know About Materials?

open access: yesAdvanced Engineering Materials, EarlyView.
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer   +2 more
wiley   +1 more source

Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors

open access: yesIEEE Access, 2018
Reversible data hiding is an important topic of data hiding. This paper proposes a novel separable and error-free reversible data hiding in an encrypted image based on two-layer pixel errors.
Chunqiang Yu   +3 more
doaj   +1 more source

Data hiding in encryption–compression domain

open access: yesComplex & Intelligent Systems, 2021
This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is transformed using lifting wavelet transform, Hessenberg decomposition and redundant singular value ...
O. P. Singh, A. K. Singh
doaj   +1 more source

Home - About - Disclaimer - Privacy