Results 91 to 100 of about 392,009 (311)

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

Direct Evidence of Topological Dirac Fermions in a Low Carrier Density Correlated 5d Oxide

open access: yesAdvanced Functional Materials, EarlyView.
The 5d oxide BiRe2O6 is discovered as a low‐carrier‐density topological semimetal hosting symmetry‐protected Dirac fermions stabilized by nonsymmorphic symmetries. Angle‐resolved photoemission spectroscopy, quantum oscillations, and magnetotransport measurements reveal gapless Dirac cones, quasi‐2D Fermi surfaces, high carrier mobility, and a field ...
Premakumar Yanda   +11 more
wiley   +1 more source

Dynamic Control of Synaptic Plasticity by Competing Ferroelectric and Trap‐Assisted Switching in IGZO Transistors with Al2O3/HfO2 Dielectrics

open access: yesAdvanced Functional Materials, EarlyView.
A frequency‐tunable ferroelectric synaptic transistor based on a buried‐gate InGaZnO channel and Al2O3/HfO2 dielectric stack exhibits linear and reversible weight updates using single‐polarity pulses. By switching between ferroelectric and trap‐assisted modes depending on input frequency, the device simplifies neuromorphic circuit design and achieves ...
Ojun Kwon   +8 more
wiley   +1 more source

Optimal Color Model for Information Hidingin Color Images

open access: yesمجلة بغداد للعلوم, 2008
In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2.
Baghdad Science Journal
doaj   +1 more source

Perfectly secure steganography: hiding information in the quantum noise of a photograph

open access: yes, 2015
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now.
Lavoie, Jonathan   +4 more
core   +2 more sources

Information Hiding Based on DNA Sequences

open access: diamond, 2023
Defaf Shiker Kadhum, Sahar Adil Kadhum
openalex   +2 more sources

Using In Situ TEM to Understand the Surfaces of Electrocatalysts at Reaction Conditions: Single‐Atoms to Nanoparticles

open access: yesAdvanced Functional Materials, EarlyView.
This review summarizes recent advances in closed‐cell in situ TEM strategies for accurate determination of the activity and stability of single‐atom catalyst systems during operation. Operando conditions causing dynamic changes of SAC systems are highlighted and we explain why ensemble average‐based optical techniques may benefit from the technological
Martin Ek   +4 more
wiley   +1 more source

Experimental Test of Quantum No-Hiding Theorem

open access: yes, 2010
Linearity and unitarity are two fundamental tenets of quantum theory. Any consequence that follows from these must be respected in the quantum world.
A. Mitra   +3 more
core   +1 more source

The Realization of Multidirectional, Free‐Standing 3D Plasmonic Nanostructures via 3D Nanoprinting: A Case Study of Fractal Antennas

open access: yesAdvanced Functional Materials, EarlyView.
Free‐standing plasmonic gold‐based fractal antennas are fabricated by 3D nanoprinting, employing focused electron beam induced deposition and an optimized purification method to remove carbon while conserving structural fidelity. Simulation and experiment show broadband plasmonic activity, including customizable polarizability, thereby paving the way ...
Verena Reisecker   +6 more
wiley   +1 more source

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]

open access: yes, 2015
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy