Results 81 to 90 of about 102,340 (326)

Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing

open access: yesAdvanced Materials, EarlyView.
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long   +26 more
wiley   +1 more source

High Capacity Reversible Data Hiding Based on the Compression of Pixel Differences

open access: yesMathematics, 2020
In this paper, we proposed a novel reversible data hiding method in encrypted image (RDHEI), which is based on the compression of pixel differences. In the proposed method, at the content owner’ side the image is divided into non-overlapping blocks, and ...
Kai-Meng Chen
doaj   +1 more source

Transistor‐Level Activation Functions via Two‐Gate Designs: From Analog Sigmoid and Gaussian Control to Real‐Time Hardware Demonstrations

open access: yesAdvanced Materials, EarlyView.
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho   +9 more
wiley   +1 more source

Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images

open access: yesCybersecurity
The rapid growth of Information and communication technology not only has positive impacts but also unveils opportunities for data and information security threats.
Aulia Arham, Hanung Adi Nugroho
doaj   +1 more source

Intelligent Acousto‐Electrical Metamaterials (IAM) for Sound Source Detection

open access: yesAdvanced Materials, EarlyView.
Our proposed metamaterial concept enables sound source detection using a single material, in contrast to conventional arrays that require dozens or even hundreds of transducers. We show that the coupled acoustic–vibrational–electrical responses in piezoelectric metamaterials give rise to topology‐governed charge transport, producing distinct voltage ...
Victor Couëdel   +7 more
wiley   +1 more source

Decoupling Dynamics and Crosslink Stability in Supramolecular Hydrogels Using Associative Exchange

open access: yesAdvanced Materials, EarlyView.
How does reorganization impact the stability of supramolecular hydrogels? In contrast to dissociative crosslink exchange, implementing associative exchange in macroscale DNA hydrogels enables decoupling of reorganization dynamics from thermal and mechanical stability.
Pierre Le Bourdonnec   +4 more
wiley   +1 more source

Enhanced Dual Reversible Data Hiding Using Combined Approaches

open access: yesApplied Sciences
This paper proposes a reversible data hiding technique based on two cover images. The proposed method enhances performance by utilizing Hamming coding (HC), arithmetic coding (AC), and an improved Exploiting Modification Direction (EMD) technique.
Cheonshik Kim, Ching-Nung Yang, Lu Leng
doaj   +1 more source

Survey on reversible data hiding techniques

open access: yesInternational Journal of Security and Its Applications, 2014
With the fast improvement of multimedia technologies and the rising attractiveness of the internet, information or data hiding methods have become more and more extensively applied to achieve authentication. Data hiding methods are ways of embedding additional messages into host signals by modifying their original contents without introducing ...
M. Manju, V. Kavitha
openaire   +1 more source

An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images

open access: yesIEEE Transactions on Information Forensics and Security, 2018
Reversible data hiding in encrypted images (RDHEI) is an effective technique to embed data in the encrypted domain. An original image is encrypted with a secret key and during or after its transmission, it is possible to embed additional information in ...
Pauline Puteaux, W. Puech
semanticscholar   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy