Results 81 to 90 of about 390,993 (284)
A coverless steganography method based on generative adversarial network
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan +4 more
doaj +1 more source
Information Hiding using Convolutional Encoding
We consider two functions f1(r) and f2(r), for r 2 Rn and the problem of ‘Diffusing’ these functions together, followed by the application of an encryption process we call ‘Stochastic Diffusion’ and then hiding the output of this process in to one or other of the same functions.
Blackledge, Jonathan +3 more
openaire +3 more sources
A Recursive Threshold Visual Cryptography Scheme [PDF]
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core +1 more source
Experimental Test of Quantum No-Hiding Theorem
Linearity and unitarity are two fundamental tenets of quantum theory. Any consequence that follows from these must be respected in the quantum world.
A. Mitra +3 more
core +1 more source
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
SIHNet: A safe image hiding method with less information leaking
Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered.
Zien Cheng +5 more
doaj +1 more source
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F. +6 more
core
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD. +1 more
core +1 more source
A pixelation‐free, monolithic iontronic pressure sensor enables simultaneous pressure and position sensing over large areas. AC‐driven ion release generates spatially varying impedance pathways depending on the pressure. Machine learning algorithms effectively decouple overlapping pressure–position signals from the multichannel outputs, achieving high ...
Juhui Kim +10 more
wiley +1 more source
Amyloidogenic Peptide Fragments Designed From Bacterial Collagen‐like Proteins Form Hydrogel
This study identified amyloidogenic sequence motifs in bacterial collagen‐like proteins and exploited these to design peptides that self‐assemble into β‐sheet fibers and form hydrogels. One hydrogel supported healthy fibroblast growth, showing promise for biocompatible materials. Our work demonstrates that bacterial sequences can be harnessed to create
Vamika Sagar +5 more
wiley +1 more source

