Results 71 to 80 of about 9,721,388 (323)
Multi-Carrier Information Hiding Algorithm Based on Angle Structure Descriptor
Aiming at the problem that the embedded capacity and security of the single-carrier information hiding algorithm can not be further improved because of the number of carriers, the carrier pre-processing and the embedding of secret information are ...
Shuai Ren+4 more
doaj +1 more source
The transform domain provides a useful tool in the field of confidential data hiding and protection. In order to protect and transmit patients’ information and competence, this study develops an amplitude quantization system in a transform domain by ...
Shuo-Tsung Chen+6 more
doaj +1 more source
Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues
The phenomenal advances of cloud computing technology have given rise to the research area of privacy-preserving signal processing, which aims to preserve information privacy even when the signals are processed in an insecure environment.
Ching-Chun Chang+2 more
semanticscholar +1 more source
Selective Redundancy Removal: A Framework for Data Hiding
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs.
Ugo Fiore
doaj +1 more source
Aim The aim of the study was to analyse the correlations among organizational justice, knowledge‐hiding behaviour and nurses' innovation ability. Design A descriptive and cross‐sectional design and the data were collected using questionnaires.
Jiating Song+3 more
doaj +1 more source
Code fusion information-hiding algorithm based on PE file function migration
PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding ...
Zuwei Tian, Hengfu Yang
doaj +1 more source
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple.
Milad Taleby Ahvanooey+3 more
semanticscholar +1 more source
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher+7 more
wiley +1 more source
Information Hiding Based on Chan-Vese Algorithm [PDF]
The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is ...
Samia Sh. Lazar, Nadia M. Mohammed
doaj +1 more source
Objective Fibromyalgia is a chronic condition characterized by widespread musculoskeletal pain and fatigue. Almost everyone with fibromyalgia has sleep problems. We aimed to evaluate the effectiveness and safety of current interventions for the management of fibromyalgia‐related sleep problems.
Jemma Hudson+11 more
wiley +1 more source