Results 31 to 40 of about 390,993 (284)
Large-capacity information hiding scheme based on minimum pixel modification
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu +4 more
doaj +1 more source
An area law for entanglement from exponential decay of correlations [PDF]
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann +39 more
core +2 more sources
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features.
Raheem Abdul Sahib Ogla
doaj +1 more source
Quiz Games as a model for Information Hiding [PDF]
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.
Bank, Bernd +5 more
core +2 more sources
Information Hiding Using Geographic Information System (GIS) Vector File [PDF]
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges.
R.F. Hassan, M.S. Mohammed
doaj +1 more source
Genre-Based Information Hiding [PDF]
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire +2 more sources
Compositional Methods for Information-Hiding [PDF]
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle +2 more
openaire +7 more sources
Improved information hiding algorithm based on twice positioning in coding channel
Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice ...
Li-quan CHEN +3 more
doaj +2 more sources
Unified Description for Network Information Hiding Methods
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech +2 more
core +2 more sources
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei +3 more
wiley +1 more source

