Results 111 to 120 of about 9,721,388 (323)

Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy

open access: yesSymmetry, 2018
Pixel value ordering (PVO) hiding scheme is a kind of data embedding technique that hides a secret message in the difference of the largest and second largest pixels of a block.
Tzu-Chuen Lu   +3 more
semanticscholar   +1 more source

Static and Dynamic Behavior of Novel Y‐Shaped Sandwich Beams Subjected to Compressive Loadings: Integration of Supervised Learning and Experimentation

open access: yesAdvanced Engineering Materials, EarlyView.
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi   +4 more
wiley   +1 more source

High-Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing

open access: yesComplexity, 2020
With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret ...
Xi-Yan Li   +4 more
doaj   +1 more source

Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials

open access: yesAdvanced Engineering Materials, EarlyView.
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani   +4 more
wiley   +1 more source

VDSC steganalysis algorithm of echo hiding

open access: yesTongxin xuebao, 2009
Based on the idea that echo hiding changing the cepstrum distribution of natural audio,a new audio steganaly-sis method was presented.The VDSC(variants of difference of sum of cepstrum)was constructed to decet echo hiding audio files without estimating ...
YANG Yu1   +3 more
doaj   +2 more sources

Conducting Polymer Microelectrode Arrays for Simultaneous Electrophysiology and Advanced Brain Imaging

open access: yesAdvanced Functional Materials, EarlyView.
A flexible micro‐electrocorticography array with PEDOT:SS electrodes is shown to be compatible with ultra‐high magnetic field MRI up to 9.4 T. Multimodal brain monitoring is demonstrated by performing simultaneous blood oxygen level‐dependent functional MRI in parallel with electrophysiology.
Sagnik Middya   +7 more
wiley   +1 more source

GAN-based patient information hiding for an ECG authentication system. [PDF]

open access: yesBiomed Eng Lett, 2023
Kang Y   +7 more
europepmc   +1 more source

Graph Models in Information Hiding

open access: yes, 2022
Information hiding allows us to hide secret information into digital objects such as images without significantly distorting the objects. The object containing hidden information will be transmitted to a data receiver via a probably insecure channel. To securely transmit the object carrying hidden information, the distortion caused by data embedding ...
openaire   +4 more sources

Information Hiding using Convolutional Encoding

open access: yes2018 29th Irish Signals and Systems Conference (ISSC), 2018
We consider two functions f1(r) and f2(r), for r 2 Rn and the problem of ‘Diffusing’ these functions together, followed by the application of an encryption process we call ‘Stochastic Diffusion’ and then hiding the output of this process in to one or other of the same functions.
Blackledge, Jonathan   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy