Results 71 to 80 of about 6,473,960 (319)

Unsupervised Steganalysis Based on Artificial Training Sets

open access: yes, 2016
In this paper, an unsupervised steganalysis method that combines artificial training setsand supervised classification is proposed. We provide a formal framework for unsupervisedclassification of stego and cover images in the typical situation of ...
Lerch-Hostalot, Daniel, Megías, David
core   +1 more source

An Exact Algorithm for Minimum Distortion Embedding [PDF]

open access: yesTheoretical Computer Science, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fomin, Fedor V.   +2 more
openaire   +1 more source

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing

open access: yesTongxin xuebao, 2023
To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded
Minqing ZHANG   +4 more
doaj   +2 more sources

Adaptive JPEG steganography based on distortion cost updating

open access: yesTongxin xuebao, 2017
Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography ...
Guang-ming TANG   +3 more
doaj   +2 more sources

Reversible Information Hiding Algorithm in Encrypted Domain Based on Difference Histogram Shifting [PDF]

open access: yesJisuanji gongcheng, 2019
The embedding capacity of the current difference histogram shifting algorithm is low.To cope with this problem,we propose a large-capacity reversible data hiding algorithm in encrypted domain.First,we use the single homomorphic encryption to enable a ...
LI Zhijia, XIA Wei
doaj   +1 more source

SpecRp: A spectral-based community embedding algorithm

open access: yesMachine Learning with Applications, 2022
Community embeddings are useful in node classification since they allow nodes to aggregate relevant information regarding the network structure. Modularity maximization-based algorithms are the most common approach to detect communities in networks ...
Camila P.S. Tautenhain   +1 more
doaj   +1 more source

Applying a Locally Linear Embedding Algorithm for Feature Extraction and Visualization of MI-EEG

open access: yesJ. Sensors, 2016
Robotic-assisted rehabilitation system based on Brain-Computer Interface (BCI) is an applicable solution for stroke survivors with a poorly functioning hemiparetic arm.
Ming-ai Li   +3 more
semanticscholar   +1 more source

Errors in graph embedding algorithms

open access: yesJournal of Computer and System Sciences, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Myrvold, Wendy, Kocay, William
openaire   +2 more sources

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy