Results 1 to 10 of about 9,721,239 (188)

Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems. [PDF]

open access: yesSensors (Basel), 2022
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain.
El Azzaoui A   +4 more
europepmc   +2 more sources

Information hiding-a survey [PDF]

open access: greenProceedings of the IEEE, 1999
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or ...
Fabien A. P. Petitcolas   +2 more
openalex   +2 more sources

Text information hiding and recovery via wavelet digital watermarking method [PDF]

open access: yesScientific Reports, 2023
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj   +2 more sources

Multiparty data hiding of quantum information [PDF]

open access: greenPhys. Rev. A 71:062339 (2005)., 2004
We present protocols for multiparty data hiding of quantum information that implement all possible threshold access structures. Closely related to secret sharing, data hiding has a more demanding security requirement: that the data remain secure against unrestricted LOCC attacks.
Patrick Hayden   +2 more
arxiv   +3 more sources

Using Fractals in Information Hiding [PDF]

open access: diamondEngineering and Technology Journal, 2009
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj   +2 more sources

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +2 more sources

Information Hiding and Attacks : Review [PDF]

open access: greenInternational Journal of Computer Trends and Technology (IJCTT) 10(1): 1-4, April 2014. Published by Seventh Sense Research Group, 2014
Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.
Richa Gupta
arxiv   +3 more sources

Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models [PDF]

open access: yesarXiv, 2019
Audio is an important medium in people's daily life, hidden information can be embedded into audio for covert communication. Current audio information hiding techniques can be roughly classed into time domain-based and transform domain-based techniques. Time domain-based techniques have large hiding capacity but low imperceptibility.
Yehao Kong, Jiliang Zhang
arxiv   +2 more sources

Coverless Information Hiding Method Based on Web Text

open access: yesIEEE Access, 2019
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long   +4 more
doaj   +2 more sources

A scheme of hiding large-size image into small-size image based on FCdDNet [PDF]

open access: yesPeerJ Computer Science
The hiding capacity of the current information hiding field has reached a relatively high level, which can hide two color images into one color image. In order to explore a larger hidden capacity, an information hiding scheme based on an improved FCdDNet
Lianshan Liu   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy