Results 61 to 70 of about 58,144 (218)
The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images
This work deals with digital image processing using the steganography technique in real life. Various steganography techniques face data authentication, data security, and copyright issues.
Andrejčík Samuel +2 more
doaj +1 more source
An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods
The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods
Qazanfari, Kazem, Safabakhsh, Reza
openaire +2 more sources
Mass Density Profiles of LSB Galaxies [PDF]
We derive the mass density profiles of dark matter halos that are implied by high spatial resolution rotation curves of low surface brightness galaxies. We find that at small radii, the mass density distribution is dominated by a nearly constant density ...
Albert Bosma +7 more
core +2 more sources
RRAM Variability Harvesting for CIM‐Integrated TRNG
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende +4 more
wiley +1 more source
We make use of the images from the Sloan Digital Sky Survey Stripe 82 to present an analysis of r band surface brightness profiles and radial color gradients (g - r, u - r) in 111 nearby early-type galaxies (ETGs).
Bender +24 more
core +1 more source
Reliable Linear, Sesquilinear and Bijective Operations On Integer Data Streams Via Numerical Entanglement [PDF]
A new technique is proposed for fault-tolerant linear, sesquilinear and bijective (LSB) operations on $M$ integer data streams ($M\geq3$), such as: scaling, additions/subtractions, inner or outer vector products, permutations and convolutions.
Anam, Mohammad Ashraful +1 more
core +2 more sources
Real‐Time and Rapid Dynamic Missile Identification Utilizing a TiOx Memristor Array
Real‐time missile target identification is demonstrated using an artificial intelligence model based on step‐weighted long–short‐term memory networks and a TiOx memristor array. The approach classifies five projectile types with enhanced early‐stage prediction through data augmentation and custom training strategies. Achieving 94.4% accuracy, the model
Mingyu Kim, Gwanyeong Park, Gunuk Wang
wiley +1 more source
Reducing vulnerability of modified LSB algorithm to a chosen statistic attacks [PDF]
[b]Abstract[/b]. The LSB algorithm is one of the most studied steganographic algorithms. There are several types of attacks that can detect the fact of conducting cover communication — chi-square attack and RS. This paper presents modification of the LSB
Kamil Kaczyński
doaj +1 more source
Environment, morphology and stellar populations of bulgeless low surface brightness galaxies
Based on the Sloan Digital Sky Survey DR 7, we investigate the environment, morphology and stellar population of bulgeless low surface brightness (LSB) galaxies in a volume-limited sample with redshift ranging from 0.024 to 0.04 and $M_r$ $\leq$ $-18.8$.
Deng, L. C. +7 more
core +2 more sources
Hominoid‐specific calretinin‐immunopositivity of the optic radiation (geniculocalcarine tract)
Calretinin‐immunostained coronal section through the primary (V1) and extrastriate (ExSt) cortex of the lar gibbon. Note that the optic radiation (OR) is strongly calretinin‐immunoreactive. This calretinin‐immunopositivity of the OR distinguishes the Hominoidea from other primates in terms of the neurochemistry of the OR.
Nelyane N. M. Santana +5 more
wiley +1 more source

