Secure edge-guided adaptive image steganography using HED-based attention maps and CNN. [PDF]
Alrawashdeh R +4 more
europepmc +1 more source
The Imperceptible Flow: Dialogic Thought and Male intruders in Edith Wharton
Daniel Hjerkinn Westby
openalex +1 more source
Measurement of the Imperceptible Threshold for Color Vibration Pairs Selected by using MacAdam Ellipse [PDF]
Shingo Hattori +2 more
openalex +1 more source
Deep Learning-Based Image Steganography with Latent Space Embedding and Smart Decoder Selection. [PDF]
Zhou Y, Wang N, Hong X, Peng Y, Shao S.
europepmc +1 more source
Imperceptible Adversarial Examples in the Physical World [PDF]
Weilin Xu +7 more
openalex +1 more source
A secure and imperceptible communication system for sharing co-ordinate data. [PDF]
Bidwe R +5 more
europepmc +1 more source
Deep learning steganography for big data security using squeeze and excitation with inception architectures. [PDF]
Issac BM +4 more
europepmc +1 more source
Ensuring integrity and security of medical image transmission in IoMT using highly imperceptible and robust watermarking approach. [PDF]
Singh P +6 more
europepmc +1 more source
Electronic music assassin: towards imperceptible physical adversarial attacks against black-box automatic speech recognitions [PDF]
Ruiyuan Li
openalex +1 more source

