Results 71 to 80 of about 9,838,902 (340)

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Effects of Pharmacologic and Nonpharmacologic Interventions for the Management of Sleep Problems in People With Fibromyalgia: Systematic Review and Network Meta‐Analysis of Randomized Controlled Trials

open access: yesArthritis Care &Research, EarlyView.
Objective Fibromyalgia is a chronic condition characterized by widespread musculoskeletal pain and fatigue. Almost everyone with fibromyalgia has sleep problems. We aimed to evaluate the effectiveness and safety of current interventions for the management of fibromyalgia‐related sleep problems.
Jemma Hudson   +11 more
wiley   +1 more source

Selective Redundancy Removal: A Framework for Data Hiding

open access: yesFuture Internet, 2010
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs.
Ugo Fiore
doaj   +1 more source

Research on Influencing Factors of Knowledge Hiding Behavior in Socialized Q&A Communities: Taking Zhihu as an Example

open access: yesComplexity, 2022
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li   +3 more
doaj   +1 more source

Genre-Based Information Hiding [PDF]

open access: yes, 2012
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire   +3 more sources

Placebo Effect Sizes in Clinical Trials of Knee Osteoarthritis Using Intra‐Articular Injections of Biologic Agents

open access: yesArthritis Care &Research, EarlyView.
Objective Patients with knee osteoarthritis rely on symptomatic treatments, in which up to 75% of the pain reduction can be attributed to the placebo effect. This effect may vary based on treatment type (eg, biologics vs nonbiologic injection) and route of administration (eg, intra‐articular vs topical vs oral).
Johanna M. Borst   +5 more
wiley   +1 more source

New secure QIM-based information hiding algorithms [PDF]

open access: yesКомпьютерная оптика, 2018
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between ...
Vitaly Mitekin, Victor Fedoseev
doaj   +1 more source

Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals

open access: yesSensors, 2023
The transform domain provides a useful tool in the field of confidential data hiding and protection. In order to protect and transmit patients’ information and competence, this study develops an amplitude quantization system in a transform domain by ...
Shuo-Tsung Chen   +6 more
doaj   +1 more source

Quantum Steganography

open access: yes, 2010
Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel.
Brun, Todd A., Shaw, Bilal A.
core   +1 more source

Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues

open access: yesIEEE Access, 2019
The phenomenal advances of cloud computing technology have given rise to the research area of privacy-preserving signal processing, which aims to preserve information privacy even when the signals are processed in an insecure environment.
Ching-Chun Chang   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy