Results 1 to 10 of about 9,721,239 (188)
Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems. [PDF]
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain.
El Azzaoui A+4 more
europepmc +2 more sources
Information hiding-a survey [PDF]
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or ...
Fabien A. P. Petitcolas+2 more
openalex +2 more sources
Text information hiding and recovery via wavelet digital watermarking method [PDF]
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj +2 more sources
Multiparty data hiding of quantum information [PDF]
We present protocols for multiparty data hiding of quantum information that implement all possible threshold access structures. Closely related to secret sharing, data hiding has a more demanding security requirement: that the data remain secure against unrestricted LOCC attacks.
Patrick Hayden+2 more
arxiv +3 more sources
Using Fractals in Information Hiding [PDF]
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj +2 more sources
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou+4 more
doaj +2 more sources
Information Hiding and Attacks : Review [PDF]
Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.
Richa Gupta
arxiv +3 more sources
Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models [PDF]
Audio is an important medium in people's daily life, hidden information can be embedded into audio for covert communication. Current audio information hiding techniques can be roughly classed into time domain-based and transform domain-based techniques. Time domain-based techniques have large hiding capacity but low imperceptibility.
Yehao Kong, Jiliang Zhang
arxiv +2 more sources
Coverless Information Hiding Method Based on Web Text
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long+4 more
doaj +2 more sources
A scheme of hiding large-size image into small-size image based on FCdDNet [PDF]
The hiding capacity of the current information hiding field has reached a relatively high level, which can hide two color images into one color image. In order to explore a larger hidden capacity, an information hiding scheme based on an improved FCdDNet
Lianshan Liu+3 more
doaj +3 more sources