Results 81 to 90 of about 391,871 (286)

Review of information hiding on Chinese text

open access: yesTongxin xuebao, 2019
Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing ...
Guohua WU   +3 more
doaj   +2 more sources

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

Information Hiding using Convolutional Encoding

open access: yes2018 29th Irish Signals and Systems Conference (ISSC), 2018
We consider two functions f1(r) and f2(r), for r 2 Rn and the problem of ‘Diffusing’ these functions together, followed by the application of an encryption process we call ‘Stochastic Diffusion’ and then hiding the output of this process in to one or other of the same functions.
Blackledge, Jonathan   +3 more
openaire   +3 more sources

Workflow for Design of Experiments‐Based Modeling of Species Transport and Growth Kinetics in GaN Hydride Vapor Phase Epitaxy

open access: yesAdvanced Engineering Materials, EarlyView.
A novel workflow for investigating hydride vapor phase epitaxy for GaN bulk crystal growth is proposed. It combines Design of experiments (DoE) with physical simulations of mass transport and crystal growth kinetics, serving as an intermediate step between DoE and experiments.
J. Tomkovič   +7 more
wiley   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing
Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered.
Zien Cheng   +5 more
doaj   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

Design of steganography algorithm based on MPEG-4 coding scheme

open access: yesTongxin xuebao, 2009
An information hiding algorithm based on MPEG-4 texture coding was proposed. Hiding information in VOP motion texture codes could be realized by replacing the YUV value of non-VOP pixels in the DCT coding block with secret data, and modifying the ...
YUAN Kai-guo   +4 more
doaj   +2 more sources

Steganographically Encoded Data [PDF]

open access: yes
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
Adrian VASILESCU
core  

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy