Results 21 to 30 of about 9,721,388 (323)
Probability of Error in Information-Hiding Protocols [PDF]
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the inference when ...
Konstantinos Chatzikokolakis+2 more
openalex +5 more sources
Analysis of Information Hiding Techniques in the Texts [PDF]
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj +1 more source
Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video.
A. Khan+6 more
semanticscholar +1 more source
A New Proposed Coding Method for Steganography Purpose [PDF]
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj +1 more source
Compositional Methods for Information-Hiding [PDF]
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle+2 more
openaire +10 more sources
Abstract This study uses longitudinal data from the UK Millennium Cohort Study (N = 13,277) to examine the childhood and early adolescence factors that predict weapon involvement in middle adolescence, which in this study is exemplified by having carried or used a weapon.
Aase Villadsen, Emla Fitzsimons
wiley +1 more source
On information hiding in retransmissions [PDF]
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of protocols that utilises retransmission mechanisms.
Krzysztof Szczypiorski+2 more
openaire +2 more sources
Abstract This study aimed to evaluate the clinical beam commissioning results and lateral penumbra characteristics of our new pencil beam scanning (PBS) proton therapy using a multi‐leaf collimator (MLC) calculated by use of a commercial Monte Carlo dose engine.
Yuki Tominaga+5 more
wiley +1 more source
Digital radiography image quality evaluation using various phantoms and software
Abstract Purpose To investigate the effect of the exposure parameters on image quality (IQ) metrics of phantom images, obtained automatically using software or from visual evaluation. Methods Three commercial phantoms and a homemade phantom constructed according to the instructions given in the IAEA Human Health Series No.
Ioannis A. Tsalafoutas+4 more
wiley +1 more source
Hiding Information in Open Auctions [PDF]
We analyze the rationale for hiding information in open auction formats. In particular, we focus on the incentives for a bidder to call a price higher than the highest standing one in order to prevent the remaining active bidders from aggregating more accurate information that could be gathered by observing the exact drop out values of the exiting ...
David Ettinger, Fabio Michelucci
openaire +5 more sources