Results 91 to 100 of about 9,721,388 (323)

Information Hiding Over Mobile using Bluetooth [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2013
Due to the evolution of massive means of communication and the exchange of information has become personal privacy vulnerable to abuse more easily than ever before, so there is a need to adopt the technology more sophisticated and more secret and ...
doaj   +1 more source

Hiding Information in Big Data based on Deep Learning [PDF]

open access: yesarXiv, 2019
The current approach of information hiding based on deep learning model can not directly use the original data as carriers, which means the approach can not make use of the existing data in big data to hiding information. We proposed a novel method of information hiding in big data based on deep learning.
arxiv  

The Potential for Extracellular Vesicles in Nanomedicine: A Review of Recent Advancements and Challenges Ahead

open access: yesAdvanced Biology, EarlyView.
Extracellular vesicles (EVs) play a dual role in diagnostics and therapeutics, offering innovative solutions for treating cancer, cardiovascular, neurodegenerative, and orthopedic diseases. This review highlights EVs’ potential to revolutionize personalized medicine through specific applications in disease detection and treatment.
Farbod Ebrahimi   +4 more
wiley   +1 more source

Breakthrough Solution for Antimicrobial Resistance Detection: Surface‐Enhanced Raman Spectroscopy‐based on Artificial Intelligence

open access: yesAdvanced Materials Interfaces, EarlyView., 2023
This review discusses the use of Surface‐Enhanced Raman Spectroscopy (SERS) combined with Artificial Intelligence (AI) for detecting antimicrobial resistance (AMR). Various SERS studies used with AI techniques, including machine learning and deep learning, are analyzed for their advantages and limitations.
Zakarya Al‐Shaebi   +4 more
wiley   +1 more source

A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix

open access: yesIETE Technical Review, 2018
In this paper, a coverless information hiding algorithm is introduced. In which, the grayscale gradient co-occurrence matrix is used to encode images and the mapping relationship between the images and the random numbers is used to express the payload ...
Jianbin Wu   +5 more
semanticscholar   +1 more source

Computing the Leakage of Information-Hiding Systems [PDF]

open access: yes, 2010
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the other based on techniques from quantitative counterexample generation. The second approach can be used either for exact or approximate computation, and provides feedback for ...
Andrés, Miguel   +3 more
openaire   +6 more sources

A Novel Digitalization Approach for Smart Materials – Ontology‐Based Access to Data and Models

open access: yesAdvanced Engineering Materials, EarlyView.
In order to access heterogeneous material data and model‐based knowledge, the established ontology‐based data access (OBDA) is extended to include material models. This novel ontology‐based data and model access (OBDMA) enables the computation of new responses beyond stored data.
Jürgen Maas   +15 more
wiley   +1 more source

FAIR and Structured Data: A Domain Ontology Aligned with Standard‐Compliant Tensile Testing

open access: yesAdvanced Engineering Materials, EarlyView.
The digitalization in materials science and engineering is discussed, emphasizing the importance of digital workflows and ontologies in managing diverse experimental data. Challenges such as quality assurance and data interoperability are tackled with semantic web technologies, focusing and introducing the tensile test ontology (TTO).
Markus Schilling   +6 more
wiley   +1 more source

Design of steganography algorithm based on MPEG-4 coding scheme

open access: yesTongxin xuebao, 2009
An information hiding algorithm based on MPEG-4 texture coding was proposed. Hiding information in VOP motion texture codes could be realized by replacing the YUV value of non-VOP pixels in the DCT coding block with secret data, and modifying the ...
YUAN Kai-guo   +4 more
doaj   +2 more sources

Large-capacity information hiding scheme based on minimum pixel modification

open access: yesEgyptian Informatics Journal, 2022
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu   +4 more
doaj  

Home - About - Disclaimer - Privacy