Results 21 to 30 of about 9,838,902 (340)

New Stenographic method to hiding information in digital image [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2017
Steganography is the art of hiding information in different cover media, then sending & displaying the hidden information especially in public places, Therefore, different methods have been proposed so far for hiding information. In this paper new method
Falath M.Mohammed
doaj   +3 more sources

IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network

open access: yesIET Image Processing, 2021
Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video.
A. Khan   +6 more
semanticscholar   +1 more source

Analysis of Information Hiding Techniques in the Texts [PDF]

open access: yesEngineering and Technology Journal, 2005
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj   +1 more source

A New Proposed Coding Method for Steganography Purpose [PDF]

open access: yesEngineering and Technology Journal, 2021
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj   +1 more source

Compositional Methods for Information-Hiding [PDF]

open access: yesMathematical Structures in Computer Science, 2008
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle   +2 more
openaire   +9 more sources

On information hiding in retransmissions [PDF]

open access: yesTelecommunication Systems, 2011
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of protocols that utilises retransmission mechanisms.
Krzysztof Szczypiorski   +2 more
openaire   +2 more sources

Practical challenges in data‐driven interpolation: Dealing with noise, enforcing stability, and computing realizations

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView., 2023
Summary In this contribution, we propose a detailed study of interpolation‐based data‐driven methods that are of relevance in the model reduction and also in the systems and control communities. The data are given by samples of the transfer function of the underlying (unknown) model, that is, we analyze frequency‐response data.
Quirin Aumann, Ion Victor Gosea
wiley   +1 more source

Hiding information in electoral competition [PDF]

open access: yesGames and Economic Behavior, 2003
Abstract We model a two-candidate electoral competition in which there is uncertainty about a policy-relevant state of the world. The candidates receive private signals about the true state, which are imperfectly correlated. We study whether the candidates are able to credibly communicate their information to voters through their choice of policy ...
Lagerlöf, J, Heidhues, P
openaire   +6 more sources

Data‐driven performance metrics for neural network learning

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView., 2023
Summary Effectiveness of data‐driven neural learning in terms of both local mimima trapping and convergence rate is addressed. Such issues are investigated in a case study involving the training of one‐hidden‐layer feedforward neural networks with the extended Kalman filter, which reduces the search for the optimal network parameters to a state ...
Angelo Alessandri   +2 more
wiley   +1 more source

Structured Medical Pathology Data Hiding Information Association Mining Algorithm Based on Optimized Convolutional Neural Network

open access: yesIEEE Access, 2020
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy