Results 91 to 100 of about 9,721,388 (323)
Information Hiding Over Mobile using Bluetooth [PDF]
Due to the evolution of massive means of communication and the exchange of information has become personal privacy vulnerable to abuse more easily than ever before, so there is a need to adopt the technology more sophisticated and more secret and ...
doaj +1 more source
Hiding Information in Big Data based on Deep Learning [PDF]
The current approach of information hiding based on deep learning model can not directly use the original data as carriers, which means the approach can not make use of the existing data in big data to hiding information. We proposed a novel method of information hiding in big data based on deep learning.
arxiv
Extracellular vesicles (EVs) play a dual role in diagnostics and therapeutics, offering innovative solutions for treating cancer, cardiovascular, neurodegenerative, and orthopedic diseases. This review highlights EVs’ potential to revolutionize personalized medicine through specific applications in disease detection and treatment.
Farbod Ebrahimi+4 more
wiley +1 more source
This review discusses the use of Surface‐Enhanced Raman Spectroscopy (SERS) combined with Artificial Intelligence (AI) for detecting antimicrobial resistance (AMR). Various SERS studies used with AI techniques, including machine learning and deep learning, are analyzed for their advantages and limitations.
Zakarya Al‐Shaebi+4 more
wiley +1 more source
A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix
In this paper, a coverless information hiding algorithm is introduced. In which, the grayscale gradient co-occurrence matrix is used to encode images and the mapping relationship between the images and the random numbers is used to express the payload ...
Jianbin Wu+5 more
semanticscholar +1 more source
Computing the Leakage of Information-Hiding Systems [PDF]
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the other based on techniques from quantitative counterexample generation. The second approach can be used either for exact or approximate computation, and provides feedback for ...
Andrés, Miguel+3 more
openaire +6 more sources
A Novel Digitalization Approach for Smart Materials – Ontology‐Based Access to Data and Models
In order to access heterogeneous material data and model‐based knowledge, the established ontology‐based data access (OBDA) is extended to include material models. This novel ontology‐based data and model access (OBDMA) enables the computation of new responses beyond stored data.
Jürgen Maas+15 more
wiley +1 more source
FAIR and Structured Data: A Domain Ontology Aligned with Standard‐Compliant Tensile Testing
The digitalization in materials science and engineering is discussed, emphasizing the importance of digital workflows and ontologies in managing diverse experimental data. Challenges such as quality assurance and data interoperability are tackled with semantic web technologies, focusing and introducing the tensile test ontology (TTO).
Markus Schilling+6 more
wiley +1 more source
Design of steganography algorithm based on MPEG-4 coding scheme
An information hiding algorithm based on MPEG-4 texture coding was proposed. Hiding information in VOP motion texture codes could be realized by replacing the YUV value of non-VOP pixels in the DCT coding block with secret data, and modifying the ...
YUAN Kai-guo+4 more
doaj +2 more sources
Large-capacity information hiding scheme based on minimum pixel modification
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu+4 more
doaj