Results 71 to 80 of about 392,009 (311)

An overview on audio steganography techniques [PDF]

open access: yes, 2012
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah   +2 more
core  

FeDSNP‐Pa Nanoassemblies: A Triple‐Action Therapeutic Strategy Targeting Oxidative Stress, Inflammation, and Pyroptosis for Retinal Ganglion Cell Protection in Glaucoma

open access: yesAdvanced Functional Materials, EarlyView.
FeDSNP‐Pa, a metallized nanoparticle loaded with sodium pyruvate (Pa), exerts triple therapeutic effects by scavenging reactive oxygen species (ROS), suppressing inflammatory responses, and inhibiting pyroptosis signaling pathways. This multifunctional neuroprotective strategy protecting retinal ganglion cells (RGCs) from elevated intraocular pressure ...
Yukun Wu   +5 more
wiley   +1 more source

New secure QIM-based information hiding algorithms [PDF]

open access: yesКомпьютерная оптика, 2018
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between ...
Vitaly Mitekin, Victor Fedoseev
doaj   +1 more source

Hiding information in image using circular distribuition [PDF]

open access: yes, 2016
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core  

Information Hiding using Steganography

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire   +1 more source

Enhanced Switching Performance in Single‐Crystalline PbTiO3 Ferroelectric Memristors for Replicating Synaptic Plasticity

open access: yesAdvanced Functional Materials, EarlyView.
This study demonstrated single‐crystalline PbTiO3‐based memristors with atomically sharp interfaces, well‐ordered lattices, and minimal lattice mismatch. The devices exhibited an ON/OFF ratio exceeding 105, high stability, and rich resistance‐state modulation.
Haining Li   +7 more
wiley   +1 more source

Code fusion information-hiding algorithm based on PE file function migration

open access: yesEURASIP Journal on Image and Video Processing, 2021
PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding ...
Zuwei Tian, Hengfu Yang
doaj   +1 more source

Improving the capacity of the ping-pong protocol

open access: yes, 2003
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol.
A. Beige   +4 more
core   +1 more source

Steep‐Switching Memory FET for Noise‐Resistant Reservoir Computing System

open access: yesAdvanced Functional Materials, EarlyView.
We demonstrate the steep‐switching memory FET with CuInP2S6/h‐BN/α‐In2Se3 heterostructure for application in noise‐resistant reservoir computing systems. The proposed device achieves steep switching characteristics (SSPGM = 19 mV/dec and SSERS = 23 mV/dec) through stabilization between CuInP2S6 and h‐BN.
Seongkweon Kang   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy