Results 41 to 50 of about 2,122,188 (202)
Data Hiding and Authentication Scheme for Medical Images Using Double POB
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which ...
Fang Ren +3 more
doaj +1 more source
Digital forensics formats: seeking a digital preservation storage format for web archiving [PDF]
In this paper we discuss archival storage formats from the point of view of digital curation and preservation. Considering established approaches to data management as our jumping off point, we selected seven format attributes which are core to the ...
Kim, Y., Ross, S.
core +4 more sources
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique [PDF]
Digital medical images are very easy to be modified for illegal purposes. For example, microcalcification in mammography is an important diagnostic clue, and it can be wiped off intentionally for insurance purposes or added intentionally into a normal mammography.
Wu, JHK +6 more
openaire +3 more sources
Recovering Physical Parameters from Galaxy Spectra Using MOPED [PDF]
We derive physical parameters of galaxies from their observed spectrum, using MOPED, the optimized data compression algorithm of Heavens, Jimenez & Lahav 2000.
Heavens, Alan +2 more
core +3 more sources
Compression-Assisted Adaptive ECC and RAID Scattering for NAND Flash Storage Devices
NAND flash memory-based storage devices are vulnerable to errors induced by NAND flash memory cells. Error-correction codes (ECCs) are integrated into the flash memory controller to correct errors in flash memory. However, since ECCs show inherent limits
Seung-Ho Lim, Ki-Woong Park
doaj +1 more source
Almost Lossless Analog Signal Separation
We propose an information-theoretic framework for analog signal separation. Specifically, we consider the problem of recovering two analog signals from a noiseless sum of linear measurements of the signals. Our framework is inspired by the groundbreaking
Bölcskei, Helmut +2 more
core +2 more sources
Efficient and Robust Compressed Sensing Using Optimized Expander Graphs [PDF]
Expander graphs have been recently proposed to construct efficient compressed sensing algorithms. In particular, it has been shown that any n-dimensional vector that is k-sparse can be fully recovered using O(klog n) measurements and only O(klog n ...
Calderbank, Robert +3 more
core +2 more sources
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details.
Tz-Yi You +5 more
doaj +1 more source
Analysis of properties of reversible steganography methods
Steganography is a science that deals with hiding information in other information, and it's becoming increasingly popular with rapid growth of Internet utilization.
Piotr Zimnicki, Grzegorz Kozieł
doaj +1 more source
In this paper, the problem of developing universal algorithms for compressed sensing of stochastic processes is studied. First, R\'enyi's notion of information dimension (ID) is generalized to analog stationary processes.
Jalali, Shirin, Poor, H. Vincent
core +1 more source

