Results 61 to 70 of about 24,642,685 (320)
Hiding data in halftone image using modified data hiding error diffusion [PDF]
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none can be applied to halftone images. In this paper, we proposed a novel data hiding method, Modified Data Hiding Ordered Dithering (MDHED ...
Ming S. Fu, Oscar C. L. Au
openaire +1 more source
Reduction of the Accompanying Noise when Hidding in an Audio File [PDF]
The stereography which used to hide certain information using a host file is a science and an art. Such practice is usually done to keep away any thought in the presence of a hidden message in the host.
Radwan Al-Jawadi, Adel Issa
doaj +1 more source
Data hiding by using AES Algorithm
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchange the data over the internet network is very important issue. So, in order to transfer the data securely to
Prof. Dr.Rafidah Mohamad
doaj +1 more source
Recent work has shown how to use the laws of quantum mechanics to keep classical and quantum bits secret in a number of different circumstances. Among the examples are private quantum channels, quantum secret sharing and quantum data hiding. In this paper we show that a method for keeping two classical bits hidden in any such scenario can be used to ...
DiVincenzo, David P. +2 more
openaire +2 more sources
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting [PDF]
In recent years, reversible data hiding (RDH), a new research hotspot in the field of information security, has been paid more and more attention by researchers.
Yujie Jia +3 more
semanticscholar +1 more source
Structural and biochemical characterisations show that the planar cell polarity (PCP) protein Inturned harbours a unique PDZ‐like domain that does not bind canonical PDZ‐binding motifs (PBMs) like that of another PCP protein Vangl2. In contrast, the apical‐basal polarity protein Scribble contains four PDZ domains that bind Vangl2, but one PDZ domain ...
Stephan Wilmes +4 more
wiley +1 more source
Improving random number generators by chaotic iterations. Application in data hiding
In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs.
Bahi, Jacques M. +2 more
core +2 more sources
Attention Based Data Hiding with Generative Adversarial Networks
Recently, the generative adversarial network is the hotspot in research and industrial areas. Its application on data generation is the most common usage.
Chong Yu
semanticscholar +1 more source
Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley +1 more source
Knowledge hiding and individual task performance: The role of individual creativity as mediator
This study investigates the association of knowledge hiding with individual task performance and the mediation role of individual creativity. It focuses on how employees' knowledge-hiding behavior can influence their task performance and how individual ...
Ika Atma Kurniawanti +3 more
doaj +1 more source

