Results 101 to 110 of about 392,009 (311)

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Exploiting Two‐Photon Lithography, Deposition, and Processing to Realize Complex 3D Magnetic Nanostructures

open access: yesAdvanced Functional Materials, EarlyView.
Two‐photon lithography (TPL) enables 3D magnetic nanostructures with unmatched freedom in geometry and material choice. Advances in voxel control, deposition, and functionalization open pathways to artificial spin ices, racetracks, microrobots, and a number of additional technological applications.
Joseph Askey   +5 more
wiley   +1 more source

Coverless Information Hiding Method Based on Web Text

open access: yesIEEE Access, 2019
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long   +4 more
doaj   +1 more source

Steganographically Encoded Data [PDF]

open access: yes
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
Adrian VASILESCU
core  

Ultrahigh‐Yield, Multifunctional, and High‐Performance Organic Memory for Seamless In‐Sensor Computing Operation

open access: yesAdvanced Functional Materials, EarlyView.
Molecular engineering of a nonconjugated radical polymer enables a significant enhancement of the glass transition temperature. The amorphous nature and tunability of the polymer, arising from its nonconjugated backbone, facilitates the fabrication of organic memristive devices with an exceptionally high yield (>95%), as well as substantial ...
Daeun Kim   +14 more
wiley   +1 more source

Application of Steganography for Anonymity through the Internet [PDF]

open access: yes, 2012
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too.
Bahi, Jacques M.   +3 more
core   +1 more source

Cryogenic Focused Ion Beam Milling to Investigate the Anisotropic Magnetotransport Properties of Bismuth Microcrystals

open access: yesAdvanced Functional Materials, EarlyView.
The highly anisotropic Fermi surface of bismuth results in variations in magnetotransport properties across different crystallographic directions, which can be characterized by studying microcrystals. To avoid the observed surface melting under room temperature Focused Ion Beam (FIB) irradiation, two low‐temperature FIB fabrication methods are proposed
Amaia Sáenz‐Hernández   +6 more
wiley   +1 more source

Integrated Association Rules Complete Hiding Algorithms

open access: yesAdvances in Electrical and Electronic Engineering, 2017
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy