Results 111 to 120 of about 9,721,388 (323)
Pixel value ordering (PVO) hiding scheme is a kind of data embedding technique that hides a secret message in the difference of the largest and second largest pixels of a block.
Tzu-Chuen Lu+3 more
semanticscholar +1 more source
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi+4 more
wiley +1 more source
High-Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing
With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret ...
Xi-Yan Li+4 more
doaj +1 more source
Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani+4 more
wiley +1 more source
VDSC steganalysis algorithm of echo hiding
Based on the idea that echo hiding changing the cepstrum distribution of natural audio,a new audio steganaly-sis method was presented.The VDSC(variants of difference of sum of cepstrum)was constructed to decet echo hiding audio files without estimating ...
YANG Yu1+3 more
doaj +2 more sources
Steganography in IoT: Information Hiding with Joystick and Touch Sensors. [PDF]
Koptyra K, Ogiela MR.
europepmc +1 more source
A flexible micro‐electrocorticography array with PEDOT:SS electrodes is shown to be compatible with ultra‐high magnetic field MRI up to 9.4 T. Multimodal brain monitoring is demonstrated by performing simultaneous blood oxygen level‐dependent functional MRI in parallel with electrophysiology.
Sagnik Middya+7 more
wiley +1 more source
GAN-based patient information hiding for an ECG authentication system. [PDF]
Kang Y+7 more
europepmc +1 more source
Graph Models in Information Hiding
Information hiding allows us to hide secret information into digital objects such as images without significantly distorting the objects. The object containing hidden information will be transmitted to a data receiver via a probably insecure channel. To securely transmit the object carrying hidden information, the distortion caused by data embedding ...
openaire +4 more sources
Information Hiding using Convolutional Encoding
We consider two functions f1(r) and f2(r), for r 2 Rn and the problem of ‘Diffusing’ these functions together, followed by the application of an encryption process we call ‘Stochastic Diffusion’ and then hiding the output of this process in to one or other of the same functions.
Blackledge, Jonathan+3 more
openaire +4 more sources