Results 51 to 60 of about 24,642,685 (320)

Reversible data hiding in JPEG images based on adjustable padding [PDF]

open access: yes, 2017
In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

An area law for entanglement from exponential decay of correlations [PDF]

open access: yes, 2013
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann   +39 more
core   +2 more sources

Data Hiding and Its Applications: Digital Watermarking and Steganography

open access: yesApplied Sciences, 2021
Data hiding techniques [...]
D. Megías, W. Mazurczyk, M. Kuribayashi
semanticscholar   +1 more source

An Algorithm for Data Hiding in Binary Images [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2008
In this work a new data hiding algorithm for binary images is used. In this algorithm the pixels which can be flipped without introducing noticeable artifacts are identified at first by using some rules that examine the neighbors of the central pixels in
Eman Sedeek Al-obaidy
doaj   +1 more source

Quantum data hiding with spontaneous parameter down-conversion [PDF]

open access: yes, 2003
Here we analyze the practical implication of the existing quantum data hiding protocol with Bell states produced with optical downconverter. We show that the uncertainty for the producing of the Bell states with spontaneous parameter down-conversion ...
A. Ekert   +11 more
core   +2 more sources

Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance

open access: yesIEEE Access, 2020
Information hiding is an important technique for information security, which is wildly studied by researchers. Recently embedding methods are proposed in spatial, frequency and other domains.
Yu Zhang   +4 more
doaj   +1 more source

Robust Lossless Semi Fragile Information Protection in Images

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2014
Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message.
Pushkar Dixit   +2 more
doaj   +1 more source

Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]

open access: yes, 2006
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan   +6 more
core   +2 more sources

Advanced Reversible Data Hiding With Encrypted Data [PDF]

open access: yesInternational Journal of Engineering Trends and Technology, 2014
4 pages, 10 figures, Published with International Journal of Engineering Trends and Technology (IJETT)
Sreekumar, Shilpa, Salam, Vincy
openaire   +2 more sources

Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement [PDF]

open access: yesSignal Processing, 2020
Great concern has arisen in the field of reversible data hiding in encrypted images (RDHEI) due to the development of cloud storage and privacy protection.
Z. Yin, Xiaomeng She, Jin Tang, B. Luo
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy