Results 71 to 80 of about 9,838,902 (340)
Unified Description for Network Information Hiding Methods
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech+2 more
core +2 more sources
Objective Fibromyalgia is a chronic condition characterized by widespread musculoskeletal pain and fatigue. Almost everyone with fibromyalgia has sleep problems. We aimed to evaluate the effectiveness and safety of current interventions for the management of fibromyalgia‐related sleep problems.
Jemma Hudson+11 more
wiley +1 more source
Selective Redundancy Removal: A Framework for Data Hiding
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs.
Ugo Fiore
doaj +1 more source
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li+3 more
doaj +1 more source
Genre-Based Information Hiding [PDF]
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire +3 more sources
Objective Patients with knee osteoarthritis rely on symptomatic treatments, in which up to 75% of the pain reduction can be attributed to the placebo effect. This effect may vary based on treatment type (eg, biologics vs nonbiologic injection) and route of administration (eg, intra‐articular vs topical vs oral).
Johanna M. Borst+5 more
wiley +1 more source
New secure QIM-based information hiding algorithms [PDF]
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between ...
Vitaly Mitekin, Victor Fedoseev
doaj +1 more source
The transform domain provides a useful tool in the field of confidential data hiding and protection. In order to protect and transmit patients’ information and competence, this study develops an amplitude quantization system in a transform domain by ...
Shuo-Tsung Chen+6 more
doaj +1 more source
Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel.
Brun, Todd A., Shaw, Bilal A.
core +1 more source
Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues
The phenomenal advances of cloud computing technology have given rise to the research area of privacy-preserving signal processing, which aims to preserve information privacy even when the signals are processed in an insecure environment.
Ching-Chun Chang+2 more
semanticscholar +1 more source