Results 91 to 100 of about 9,838,902 (340)
Information Hiding as a Challenge for Malware Detection [PDF]
Information hiding techniques are increasingly utilized by the current malware to hide its existence and communication attempts. In this paper we highlight this new trend by reviewing the most notable examples of malicious software that shows this capability.
Mazurczyk Wojciech, Caviglione Luca
openaire +4 more sources
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi+4 more
wiley +1 more source
Review of information hiding on Chinese text
Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing ...
Guohua WU+3 more
doaj +2 more sources
A Recursive Threshold Visual Cryptography Scheme [PDF]
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core +1 more source
Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani+4 more
wiley +1 more source
Large-capacity information hiding scheme based on minimum pixel modification
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu+4 more
doaj
A coverless steganography method based on generative adversarial network
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan+4 more
doaj +1 more source
Hiding information in image using circular distribuition [PDF]
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core
What happens when 32 labs join forces to study nanoparticle‐modified powders? A data‐driven journey through laser powder bed fusion—now openly accessible for the entire additive manufacturing community—is studied. Laser powder bed fusion is a cornerstone technology for additive manufacturing (AM) of metals and polymers, yet challenges in achieving ...
Ihsan Murat Kuşoğlu+73 more
wiley +1 more source
SIHNet: A safe image hiding method with less information leaking
Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered.
Zien Cheng+5 more
doaj +1 more source