Results 61 to 70 of about 24,642,685 (320)

Hiding data in halftone image using modified data hiding error diffusion [PDF]

open access: yesSPIE Proceedings, 2000
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none can be applied to halftone images. In this paper, we proposed a novel data hiding method, Modified Data Hiding Ordered Dithering (MDHED ...
Ming S. Fu, Oscar C. L. Au
openaire   +1 more source

Reduction of the Accompanying Noise when Hidding in an Audio File [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2008
The stereography which used to hide certain information using a host file is a science and an art. Such practice is usually done to keep away any thought in the presence of a hidden message in the host.
Radwan Al-Jawadi, Adel Issa
doaj   +1 more source

Data hiding by using AES Algorithm

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchange the data over the internet network is very important issue. So, in order to transfer the data securely to
Prof. Dr.Rafidah Mohamad
doaj   +1 more source

Hiding Quantum Data

open access: yesFoundations of Physics, 2003
Recent work has shown how to use the laws of quantum mechanics to keep classical and quantum bits secret in a number of different circumstances. Among the examples are private quantum channels, quantum secret sharing and quantum data hiding. In this paper we show that a method for keeping two classical bits hidden in any such scenario can be used to ...
DiVincenzo, David P.   +2 more
openaire   +2 more sources

Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting [PDF]

open access: yesSignal Processing, 2019
In recent years, reversible data hiding (RDH), a new research hotspot in the field of information security, has been paid more and more attention by researchers.
Yujie Jia   +3 more
semanticscholar   +1 more source

The planar cell polarity protein Vangl2 interacts with the PDZ‐domains of Scribble but not with a unique PDZ‐like domain in Inturned

open access: yesFEBS Letters, EarlyView.
Structural and biochemical characterisations show that the planar cell polarity (PCP) protein Inturned harbours a unique PDZ‐like domain that does not bind canonical PDZ‐binding motifs (PBMs) like that of another PCP protein Vangl2. In contrast, the apical‐basal polarity protein Scribble contains four PDZ domains that bind Vangl2, but one PDZ domain ...
Stephan Wilmes   +4 more
wiley   +1 more source

Improving random number generators by chaotic iterations. Application in data hiding

open access: yes, 2010
In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs.
Bahi, Jacques M.   +2 more
core   +2 more sources

Attention Based Data Hiding with Generative Adversarial Networks

open access: yesAAAI Conference on Artificial Intelligence, 2020
Recently, the generative adversarial network is the hotspot in research and industrial areas. Its application on data generation is the most common usage.
Chong Yu
semanticscholar   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Knowledge hiding and individual task performance: The role of individual creativity as mediator

open access: yesHeliyon, 2023
This study investigates the association of knowledge hiding with individual task performance and the mediation role of individual creativity. It focuses on how employees' knowledge-hiding behavior can influence their task performance and how individual ...
Ika Atma Kurniawanti   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy