Results 111 to 120 of about 53,608 (389)
Recent Advances of Image Steganography With Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu+6 more
doaj +1 more source
Effective Steganography Detection Based On Data Compression [PDF]
This article describes novel text steganalysis method. The archiver "Bzip2" used for detection stegotext generated by Texto stegosystem. Experiments show that proposed approach gets better performance than typical existing methods. The detection accuracy exceeds 99.98% for text segments with size 400 bytes.
arxiv
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.+1 more
core +1 more source
The protonated form of butyrate, as well as other short‐chain fatty acids (SCFAs), is membrane permeable. In acidic extracellular environments, this can lead to intracellular accumulation of SCFAs and cytosolic acidification. This phenomenon will be particularly relevant in acidic environments such as the large intestine or tumor microenvironments ...
Muwei Jiang+2 more
wiley +1 more source
High-Capacity Image Steganography Based on Improved Xception
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan+4 more
doaj +1 more source
Developing a Video Steganography Toolkit [PDF]
Although techniques for separate image and audio steganography are widely known, relatively little has been described concerning the hiding of information within video streams ("video steganography"). In this paper we review the current state of the art in this field, and describe the key issues we have encountered in developing a practical video ...
arxiv
Universal distortion function for steganography in an arbitrary domain
Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function.
Vojtech Holub+2 more
semanticscholar +1 more source
Natural Steganography: cover-source switching for better steganography [PDF]
This paper proposes a new steganographic scheme relying on the principle of cover-source switching, the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography, considers the sensor noise naturally present in the raw images and uses the principle that, by the addition ...
openaire +3 more sources
Z2Z4-Additive Perdect Codes in Steganography [PDF]
Steganography is an information hiding application which aims to hide secret data imperceptibly into a cover object. In this paper, we describe a novel coding method based on Z2Z4-additive codes in which data is embedded by distorting each cover ...
Rifà Coma, Josep+2 more
core
A stepwise emergence of evolution in the RNA world
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley +1 more source