Results 191 to 200 of about 9,838,902 (340)
Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm [PDF]
Tao Zhang, Shuai Ren
openalex +1 more source
Spin‐Polarized Antiferromagnets for Spintronics
This review highlights recent advances in anomalous and spin transport phenomena in spin‐polarized antiferromagnets. Key effects—including the anomalous Hall, Nernst, and magneto‐optical effects—are discussed across various antiferromagnetic platforms.
Zhenzhou Guo+5 more
wiley +1 more source
An Information Hiding Scheme Using a Pattern-Based Compression Algorithm
Farhad Keissarian
openalex +2 more sources
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Key Cryptosystem [PDF]
Herman Kabetta
openalex +1 more source
Organic Ferroelectric Synaptic Transistors for Neural Image Recognition Networks
All organic transistors, where both the dielectric and semiconducting layers are polymeric, are developed as electrical synaptic devices. Two copolymers of PVDF as the dielectric layer with large differences in their saturation polarizability and memory window are chosen.
Evan Restuccia+2 more
wiley +1 more source
Electroplated Polymer‐Modified Carbon Fiber for Performance‐Enhancing Composite Interfaces
Chitosan is electrodeposited onto the surface of carbon fibers in an energy‐efficient and simplified procedure, enhancing interfacial bonding potential with various epoxy matrices. The coated fibers effectively function as reinforcing fillers in both continuous and discontinuous states.
Zeyang Yu+8 more
wiley +1 more source
Information Hiding Using Least Significant Bit Steganography and Cryptography [PDF]
Ankur Gupta, Bharat Bhushan
openalex +1 more source
This article demonstrates that encasing a hyperelastic balloon in an inextensible sleeve greatly increases its burst pressure. This simple mechanical behavior can be used to produce an asymmetric inflation‐deflation sequence for coupled balloons with different thicknesses so they could serve as a soft robot's rear and front anchors when driven from a ...
Ifat Gertler, Katherine J. Kuchenbecker
wiley +1 more source
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding. [PDF]
Zhang J, Wen H.
europepmc +1 more source