Results 61 to 70 of about 58,647 (231)

An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods

open access: yes, 2017
The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods
Qazanfari, Kazem, Safabakhsh, Reza
openaire   +2 more sources

Metabologenomic Hallmark‐Based Discovery of Bacterial Thioamides as a New Lead against Drug‐Resistant Pancreatic Cancer

open access: yesAdvanced Science, EarlyView.
A targeted metabologenomic strategy integrating genomic and metabolomic hallmarks enabled the discovery of two new thioamides, thiogochangamides A and B, from bacteria. Their absolute configurations, previously unresolved within the thioviridamide family, were fully assigned through various chemical derivatizations and computational analysis ...
Young Eun Du   +18 more
wiley   +1 more source

Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2020
Kesadaran pentingnya keamanan data pada era digital saat ini ditandai dengan berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis histogram terhadap suatu aplikasi keamanan data.
Nur Fitrianingsih Hasan   +2 more
doaj   +1 more source

The stellar disk thickness of LSB galaxies

open access: yes, 2004
We present surface photometry results for a sample of eleven edge-on galaxies observed with the 6m telescope at the Special Astrophysical Observatory (Russia).
Barteldrees A.   +15 more
core   +1 more source

Flexible IMU Sensor Array For 3D Colonoscope Shape Reconstruction and AI‐Based Loop Detection

open access: yesAdvanced Science, EarlyView.
We propose a sensing platform for 3D visualization of the colonoscope combined with artificial intelligence (AI)‐based loop detection. The system consists of an array of 15 inertial measurement units (IMUs) mounted on a flexible printed circuit board that can be retrofitted into the instrument channel of conventional colonoscopes.
Tuukka Panula   +3 more
wiley   +1 more source

Combination and comparison of AES and RC4 cryptography in least significant bit (LSB) method in digital image to improve message security

open access: yesJurnal Informatika, 2018
Message security is something that must be kept secretly. However, to maintain the security and the secret of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is to use cryptography. As
Rahmat Sulaiman
doaj   +1 more source

An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit [PDF]

open access: yes, 2012
Software watermarking is one of the most important methods for protecting copyrights and authenticating ownership; which can be used to prevent software piracy.
Abdullah Bamatraf, Abdullah Omar
core  

The blue compact dwarf galaxy I Zw 18: a comparative study of its low-surface-brightness component [PDF]

open access: yes, 2002
(abridged): Using HST and ground-based optical and NIR imaging data, we investigate whether the blue compact dwarf (BCD) galaxy I Zw 18 possesses an extended low-surface-brightness (LSB) old stellar population underlying its star-forming (SF) regions. We
Fricke, K. J.   +6 more
core   +2 more sources

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

Steganographic Model for encrypted messages based on DNA Encoding

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2021
Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more security to ensure its confidentiality. One way of securing information is by hiding the information
Alfian Abdul Jalid   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy