Results 71 to 80 of about 392,009 (311)
An overview on audio steganography techniques [PDF]
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah +2 more
core
FeDSNP‐Pa, a metallized nanoparticle loaded with sodium pyruvate (Pa), exerts triple therapeutic effects by scavenging reactive oxygen species (ROS), suppressing inflammatory responses, and inhibiting pyroptosis signaling pathways. This multifunctional neuroprotective strategy protecting retinal ganglion cells (RGCs) from elevated intraocular pressure ...
Yukun Wu +5 more
wiley +1 more source
New secure QIM-based information hiding algorithms [PDF]
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between ...
Vitaly Mitekin, Victor Fedoseev
doaj +1 more source
Hiding information in image using circular distribuition [PDF]
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core
Information Hiding using Steganography
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire +1 more source
PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation [PDF]
Yixiang Fang +4 more
openalex +1 more source
This study demonstrated single‐crystalline PbTiO3‐based memristors with atomically sharp interfaces, well‐ordered lattices, and minimal lattice mismatch. The devices exhibited an ON/OFF ratio exceeding 105, high stability, and rich resistance‐state modulation.
Haining Li +7 more
wiley +1 more source
Code fusion information-hiding algorithm based on PE file function migration
PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding ...
Zuwei Tian, Hengfu Yang
doaj +1 more source
Improving the capacity of the ping-pong protocol
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol.
A. Beige +4 more
core +1 more source
Steep‐Switching Memory FET for Noise‐Resistant Reservoir Computing System
We demonstrate the steep‐switching memory FET with CuInP2S6/h‐BN/α‐In2Se3 heterostructure for application in noise‐resistant reservoir computing systems. The proposed device achieves steep switching characteristics (SSPGM = 19 mV/dec and SSERS = 23 mV/dec) through stabilization between CuInP2S6 and h‐BN.
Seongkweon Kang +6 more
wiley +1 more source

