Results 91 to 100 of about 9,838,902 (340)

Information Hiding as a Challenge for Malware Detection [PDF]

open access: yesIEEE Security & Privacy, 2015
Information hiding techniques are increasingly utilized by the current malware to hide its existence and communication attempts. In this paper we highlight this new trend by reviewing the most notable examples of malicious software that shows this capability.
Mazurczyk Wojciech, Caviglione Luca
openaire   +4 more sources

Static and Dynamic Behavior of Novel Y‐Shaped Sandwich Beams Subjected to Compressive Loadings: Integration of Supervised Learning and Experimentation

open access: yesAdvanced Engineering Materials, EarlyView.
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi   +4 more
wiley   +1 more source

Review of information hiding on Chinese text

open access: yesTongxin xuebao, 2019
Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing ...
Guohua WU   +3 more
doaj   +2 more sources

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials

open access: yesAdvanced Engineering Materials, EarlyView.
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani   +4 more
wiley   +1 more source

Large-capacity information hiding scheme based on minimum pixel modification

open access: yesEgyptian Informatics Journal, 2022
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu   +4 more
doaj  

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

Hiding information in image using circular distribuition [PDF]

open access: yes, 2016
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core  

Large‐Scale Interlaboratory Study Along the Entire Process Chain of Laser Powder Bed Fusion: Bridging Variability, Standards, and Optimization across Metals and Polymers

open access: yesAdvanced Engineering Materials, EarlyView.
What happens when 32 labs join forces to study nanoparticle‐modified powders? A data‐driven journey through laser powder bed fusion—now openly accessible for the entire additive manufacturing community—is studied. Laser powder bed fusion is a cornerstone technology for additive manufacturing (AM) of metals and polymers, yet challenges in achieving ...
Ihsan Murat Kuşoğlu   +73 more
wiley   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing
Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered.
Zien Cheng   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy