Results 11 to 20 of about 58,647 (231)
Improved LSB Method using Standard Deviation Scale [PDF]
The concealment of the most important means used by the security institutions with critical communications in all countries of the world, they provided the technology of high security, especially in the communication networks and the Internet. Summarized
Nadia Mohammed, Riyam Essa, Amina Najim
doaj +1 more source
Background Acceptance of evolutionary theory varies widely and is often associated with religious background. Some have suggested there exists an additional relationship between scientific reasoning ability and the acceptance of evolutionary theory.
Katie F. Manwaring +5 more
doaj +1 more source
Text File Hiding Randomly Using Secret Sharing Scheme [PDF]
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection of information from disclosure to unauthorizedpersons.
Yossra Ali, Hussein Mankhi
doaj +1 more source
Dynamical Stability and Galaxy Evolution in LSB Disk Galaxies [PDF]
We demonstrate that, due to their low surface mass density and large dark matter content, LSB disks are quite stable against the growth of global bar modes. However, they may be only marginally stable against local disk instabilities.
de Blok, Erwin +2 more
core +4 more sources
A Natural Language Steganography Technique for Text Hiding Using LSB's [PDF]
Steganography is the art of hiding, and transmitting information usingapparently innocent carrier without expose any suspicion. This paper present anatural language steganography technique, which is different from all the naturallanguage steganography ...
Hanaa M. Salman
doaj +1 more source
The dependence of HII region properties on global and local surface brightness within galaxy discs [PDF]
Using B, R, and H-alpha images of roughly equal-sized samples of low surface brightness (LSB) and high surface brightness (HSB) galaxies (~40 galaxies apiece), we have explored the dependence of HII region properties on local and global disc surface ...
Barnes +50 more
core +1 more source
GLM for Image Steganography Technique [PDF]
An improvement to a Steganography method for hiding data using Gray Level Images is proposed in this paper. The method is an improvement over earlier method named Least Significant Bit (LSB).
Ahmed Nori, Noor Ahmed, Thana Ahmed
doaj +1 more source
Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom
Keamanan data merupakan hal yang sangat penting untuk dilakukan agar pesan atau informasi terkirim kepada seseorang yang tidak diketahui oleh orang yang tidak berwenang.
Kiswara Agung Santoso +2 more
doaj +1 more source
Women's attitudes toward practicing cytomegalovirus prevention behaviors
Congenital cytomegalovirus (CMV) infection causes severe disabilities and developmental delays. Women's awareness of CMV is low. Only about half of healthcare providers report counseling women about behaviors to reduce CMV risk and public health ...
Rosemary Thackeray, Brianna M. Magnusson
doaj +1 more source
Dual Hiding in Digital Image Files [PDF]
The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
Farah Mohammed
doaj +1 more source

