Results 31 to 40 of about 390,993 (284)

Large-capacity information hiding scheme based on minimum pixel modification

open access: yesEgyptian Informatics Journal, 2022
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu   +4 more
doaj   +1 more source

An area law for entanglement from exponential decay of correlations [PDF]

open access: yes, 2013
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann   +39 more
core   +2 more sources

Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images

open access: yesمجلة بغداد للعلوم, 2019
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features.
Raheem Abdul Sahib Ogla
doaj   +1 more source

Quiz Games as a model for Information Hiding [PDF]

open access: yes, 2015
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.
Bank, Bernd   +5 more
core   +2 more sources

Information Hiding Using Geographic Information System (GIS) Vector File [PDF]

open access: yesEngineering and Technology Journal, 2017
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges.
R.F. Hassan, M.S. Mohammed
doaj   +1 more source

Genre-Based Information Hiding [PDF]

open access: yes, 2012
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire   +2 more sources

Compositional Methods for Information-Hiding [PDF]

open access: yesMathematical Structures in Computer Science, 2008
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle   +2 more
openaire   +7 more sources

Improved information hiding algorithm based on twice positioning in coding channel

open access: yesTongxin xuebao, 2013
Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice ...
Li-quan CHEN   +3 more
doaj   +2 more sources

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy