Results 81 to 90 of about 9,721,388 (323)

New secure QIM-based information hiding algorithms [PDF]

open access: yesКомпьютерная оптика, 2018
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between ...
Vitaly Mitekin, Victor Fedoseev
doaj   +1 more source

On the Bayes risk in information-hiding protocols [PDF]

open access: yesJournal of Computer Security, 2008
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the MAP (maximum a posteriori ...
Chatzikokolakis, Konstantinos   +2 more
openaire   +5 more sources

Image encryption algorithm based on reversible information hiding and physical chaos in images

open access: yesResults in Physics, 2023
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small ...
Pengcheng Liu
doaj  

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing
Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered.
Zien Cheng   +5 more
doaj   +1 more source

Information Hiding Techniques: A Tutorial Review [PDF]

open access: yesarXiv, 2008
The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.
arxiv  

Data‐driven forecasting of ship motions in waves using machine learning and dynamic mode decomposition

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Summary Data‐driven forecasting of ship motions in waves is investigated through feedforward and recurrent neural networks as well as dynamic mode decomposition. The goal is to predict future ship motion variables based on past data collected on the field, using equation‐free approaches.
Matteo Diez   +2 more
wiley   +1 more source

Review of information hiding on Chinese text

open access: yesTongxin xuebao, 2019
Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing ...
Guohua WU   +3 more
doaj   +2 more sources

Large Capacity Data Hiding in Binary Image black and white mixed regions [PDF]

open access: yes
Information hiding technology utilizes the insensitivity of human sensory organs to redundant data, hiding confidential information in the redundant data of these public digital media, and then transmitting it. The carrier media after hiding secret information only displays its own characteristics, which can ensure the transmission of confidential ...
arxiv   +1 more source

Effects of Dalcroze Eurhythmics Exercise Versus Multicomponent Exercise on Physical and Cognitive Function, and Falls in Older Adults: The EPHYCOS Randomized Controlled Trial

open access: yesAdvanced Biology, EarlyView.
In this randomized clinical trial conducted among 142 community‐dwelling older adults at high risk for falls over 12 months, a Dalcroze Eurhythmics exercise intervention (once weekly, group‐based) improved a variety of physical and cognitive/executive function outcomes compared with a multicomponent exercise intervention (twice weekly, group‐ and home ...
Mélany Hars   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy