Results 131 to 140 of about 9,838,902 (340)
VDSC steganalysis algorithm of echo hiding
Based on the idea that echo hiding changing the cepstrum distribution of natural audio,a new audio steganaly-sis method was presented.The VDSC(variants of difference of sum of cepstrum)was constructed to decet echo hiding audio files without estimating ...
YANG Yu1+3 more
doaj +2 more sources
GAN-based patient information hiding for an ECG authentication system. [PDF]
Kang Y+7 more
europepmc +1 more source
Information Hiding using Convolutional Encoding
We consider two functions f1(r) and f2(r), for r 2 Rn and the problem of ‘Diffusing’ these functions together, followed by the application of an encryption process we call ‘Stochastic Diffusion’ and then hiding the output of this process in to one or other of the same functions.
Blackledge, Jonathan+3 more
openaire +4 more sources
Machine Learning Guided Design of Nerve‐On‐A‐Chip Platforms with Promoted Neurite Outgrowth
Compared to labor‐intensive trial‐and‐error experimentation, a machine learning (ML)‐guided workflow, incorporating cell viability assays, data augmentation, ensemble modeling, and model interpretation, is developed to accelerate nerve‐on‐a‐chip optimization and uncover data‐driven design principles.
Tsai‐Chun Chung+8 more
wiley +1 more source
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis
Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has
Milad Taleby Ahvanooey+4 more
doaj +1 more source
Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping. [PDF]
Huang CT, Lin CY, Weng CY.
europepmc +1 more source
A survey on information hiding using video steganography
Mukesh Dalal, Mamta Juneja
semanticscholar +1 more source
A multi‐layered anti‐counterfeiting platform is developed based on an azopolymer (PAzo) system. By leveraging the molecular orientation control of PAzo under linearly polarized light (LPL), encrypted patterns are fabricated that remain invisible under standard conditions and require polarized optical microscopy (POM) for decryption.
Ming‐Hsuan Chang+10 more
wiley +1 more source
Reversible information hiding scheme based on interpolation and histogram shift for medical images. [PDF]
Ren F, Liu Y, Zhang X, Li Q.
europepmc +1 more source