Results 31 to 40 of about 58,276 (196)

Information Hiding in Color Image based on LSB and FA [PDF]

open access: yesKirkuk Journal of Science, 2017
In this research was to hide information in color images of the type of Joint Photographic Experts Group (JPEG) using hiding technique Least Significant Bit (LSB) with Firefly algorithm.
Dr. Ahmed Sami Nori, Jasim Ibrahim Jasim
doaj   +1 more source

Analisa Visual Citra Hasil Kombinasi Steganografi dan Kriptografi Berbasis Least Significant Bit Dalam Cipher

open access: yesJurnal Masyarakat Informatika, 2023
Kriptografi dan steganografi adalah teknik yang digunakan untuk mengamankan data untuk meminimalkan pencurian data dan akses oleh orang yang tidak berwenang.
Ibnu Utomo Wahyu Mulyono   +2 more
doaj   +1 more source

Development of Indirect Competitive ELISA for Lithospermic Acid B of Salvia miltiorrhiza with Its Specific Antibodies Generated via Artificial Oil Bodies

open access: yesMolecules, 2019
Lithospermic acid B (LSB), the major water-soluble ingredient of Salvia miltiorrhiza (Danshen), has been shown to be an active ingredient responsible for the therapeutic effects of this traditional Chinese herb used to treat cardiac disorders. This study
Yu-En Shih   +3 more
doaj   +1 more source

The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images

open access: yesActa Electrotechnica et Informatica, 2023
This work deals with digital image processing using the steganography technique in real life. Various steganography techniques face data authentication, data security, and copyright issues.
Andrejčík Samuel   +2 more
doaj   +1 more source

Bose-Einstein Condensate Dark Matter Halos confronted with galactic rotation curves [PDF]

open access: yes, 2017
We present a comparative confrontation of both the Bose-Einstein Condensate (BEC) and the Navarro-Frenk-White (NFW) dark halo models with galactic rotation curves.
Dwornik, M.   +3 more
core   +3 more sources

Reducing vulnerability of modified LSB algorithm to a chosen statistic attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2014
[b]Abstract[/b]. The LSB algorithm is one of the most studied steganographic algorithms. There are several types of attacks that can detect the fact of conducting cover communication — chi-square attack and RS. This paper presents modification of the LSB
Kamil Kaczyński
doaj   +1 more source

Further Discoveries of 12CO in Low Surface Brightness Galaxies [PDF]

open access: yes, 2003
Using the IRAM 30m telescope we have obtained seven new, deep CO J(1-0) and J(2-1) observations of low surface brightness (LSB) galaxies. Five of the galaxies have no CO detected to extremely low limits (0.1-0.4 K km/s at J(1-0)), while two of the ...
Bergvall N.   +15 more
core   +2 more sources

Image Steganography using LSB and LSB+Huffman Code

open access: yesInternational Journal of Computer Applications, 2014
Steganography is an important area of research in recent years involving a various number of applications. It is the science of embedding information into cover of the media such as text, image, audio, and video. This paper uses two techniques for Steganography (text into image): Least Significant Bit (LSB) and Least Significant Bit with Huffman code ...
openaire   +1 more source

Low Surface Brightness Galaxies around the HDF-S: II. Distances and volume densities

open access: yes, 2007
With this study we aim at the spectroscopic verification of a photometrically selected sample of Low Surface Brightness (LSB) galaxy candidates in a field around the Hubble Deep Field-South (HDF-S).
Bell   +36 more
core   +1 more source

Steganographic Model for encrypted messages based on DNA Encoding

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2021
Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more security to ensure its confidentiality. One way of securing information is by hiding the information
Alfian Abdul Jalid   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy