Results 21 to 30 of about 9,721,388 (323)

Probability of Error in Information-Hiding Protocols [PDF]

open access: green20th IEEE Computer Security Foundations Symposium (CSF'07), 2007
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the inference when ...
Konstantinos Chatzikokolakis   +2 more
openalex   +5 more sources

Analysis of Information Hiding Techniques in the Texts [PDF]

open access: yesEngineering and Technology Journal, 2005
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj   +1 more source

IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network

open access: yesIET Image Processing, 2021
Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video.
A. Khan   +6 more
semanticscholar   +1 more source

A New Proposed Coding Method for Steganography Purpose [PDF]

open access: yesEngineering and Technology Journal, 2021
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj   +1 more source

Compositional Methods for Information-Hiding [PDF]

open access: yesMathematical Structures in Computer Science, 2008
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle   +2 more
openaire   +10 more sources

Longitudinal predictors of weapon involvement in middle adolescence: Evidence from the UK Millennium Cohort Study

open access: yesAggressive Behavior, Volume 49, Issue 1, Page 5-14, January 2023., 2023
Abstract This study uses longitudinal data from the UK Millennium Cohort Study (N = 13,277) to examine the childhood and early adolescence factors that predict weapon involvement in middle adolescence, which in this study is exemplified by having carried or used a weapon.
Aase Villadsen, Emla Fitzsimons
wiley   +1 more source

On information hiding in retransmissions [PDF]

open access: yesTelecommunication Systems, 2011
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of protocols that utilises retransmission mechanisms.
Krzysztof Szczypiorski   +2 more
openaire   +2 more sources

Validation of pencil beam scanning proton therapy with multi‐leaf collimator calculated by a commercial Monte Carlo dose engine

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract This study aimed to evaluate the clinical beam commissioning results and lateral penumbra characteristics of our new pencil beam scanning (PBS) proton therapy using a multi‐leaf collimator (MLC) calculated by use of a commercial Monte Carlo dose engine.
Yuki Tominaga   +5 more
wiley   +1 more source

Digital radiography image quality evaluation using various phantoms and software

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose To investigate the effect of the exposure parameters on image quality (IQ) metrics of phantom images, obtained automatically using software or from visual evaluation. Methods Three commercial phantoms and a homemade phantom constructed according to the instructions given in the IAEA Human Health Series No.
Ioannis A. Tsalafoutas   +4 more
wiley   +1 more source

Hiding Information in Open Auctions [PDF]

open access: yesSSRN Electronic Journal, 2012
We analyze the rationale for hiding information in open auction formats. In particular, we focus on the incentives for a bidder to call a price higher than the highest standing one in order to prevent the remaining active bidders from aggregating more accurate information that could be gathered by observing the exact drop out values of the exiting ...
David Ettinger, Fabio Michelucci
openaire   +5 more sources

Home - About - Disclaimer - Privacy