Results 81 to 90 of about 392,009 (311)

Review of information hiding on Chinese text

open access: yesTongxin xuebao, 2019
Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing ...
Guohua WU   +3 more
doaj   +2 more sources

Information Hiding using Convolutional Encoding

open access: yes2018 29th Irish Signals and Systems Conference (ISSC), 2018
We consider two functions f1(r) and f2(r), for r 2 Rn and the problem of ‘Diffusing’ these functions together, followed by the application of an encryption process we call ‘Stochastic Diffusion’ and then hiding the output of this process in to one or other of the same functions.
Blackledge, Jonathan   +3 more
openaire   +3 more sources

Decoupling Size and Electronic Effects in Doped SrTiO3 Photocatalysts Through Surface Area–Normalized CO2 Hydrogenation Rates

open access: yesAdvanced Functional Materials, EarlyView.
Exploring the photocatalytic reverse water–gas shift (RWGS) reaction on doped SrTiO3 nanoparticle films, reveals that normalizing catalytic rates by the catalyst's specific surface area (SSA) disentangled surface area effects from the catalyst's intrinsic material properties.
Dikshita Bhattacharyya   +6 more
wiley   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing
Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered.
Zien Cheng   +5 more
doaj   +1 more source

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

Biomimetic Iridescent Skin: Robust Prototissues Spontaneously Assembled from Photonic Protocells

open access: yesAdvanced Functional Materials, EarlyView.
Uniform nanoparticles are induced to form arrays (photonic crystals) in the cores of biopolymer capsules, endowing these ‘protocells’ with structural color. These protocells are then assembled into large self‐standing objects, i.e., prototissues, with robust mechanical properties as well as iridescent optical properties.
Medha Rath   +6 more
wiley   +1 more source

An Ultra‐Robust Memristor Based on Vertically Aligned Nanocomposite with Highly Defective Vertical Channels for Neuromorphic Computing

open access: yesAdvanced Functional Materials, EarlyView.
An ultra‐robust memristor based on SrTiO3‐CeO2 (S‐C) vertically aligned nanocomposite (VAN) achieving exceptional endurance of 1012 switching cycles via interface engineering. Artificial neural networks (ANNs) integrated with S‐C VAN memristors exhibit high training accuracy across multiple datasets.
Zedong Hu   +12 more
wiley   +1 more source

Design of steganography algorithm based on MPEG-4 coding scheme

open access: yesTongxin xuebao, 2009
An information hiding algorithm based on MPEG-4 texture coding was proposed. Hiding information in VOP motion texture codes could be realized by replacing the YUV value of non-VOP pixels in the DCT coding block with secret data, and modifying the ...
YUAN Kai-guo   +4 more
doaj   +2 more sources

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Home - About - Disclaimer - Privacy