Results 111 to 120 of about 53,608 (389)

Recent Advances of Image Steganography With Generative Adversarial Networks

open access: yesIEEE Access, 2020
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu   +6 more
doaj   +1 more source

Effective Steganography Detection Based On Data Compression [PDF]

open access: yesNechta I. Effective steganography detection based on data compression, Vestnik SIBSUTIS 2010 No.1. P. 50-55, 2011
This article describes novel text steganalysis method. The archiver "Bzip2" used for detection stegotext generated by Texto stegosystem. Experiments show that proposed approach gets better performance than typical existing methods. The detection accuracy exceeds 99.98% for text segments with size 400 bytes.
arxiv  

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

Protonophore activity of short‐chain fatty acids induces their intracellular accumulation and acidification

open access: yesFEBS Letters, EarlyView.
The protonated form of butyrate, as well as other short‐chain fatty acids (SCFAs), is membrane permeable. In acidic extracellular environments, this can lead to intracellular accumulation of SCFAs and cytosolic acidification. This phenomenon will be particularly relevant in acidic environments such as the large intestine or tumor microenvironments ...
Muwei Jiang   +2 more
wiley   +1 more source

High-Capacity Image Steganography Based on Improved Xception

open access: yesSensors, 2020
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan   +4 more
doaj   +1 more source

Developing a Video Steganography Toolkit [PDF]

open access: yesarXiv, 2014
Although techniques for separate image and audio steganography are widely known, relatively little has been described concerning the hiding of information within video streams ("video steganography"). In this paper we review the current state of the art in this field, and describe the key issues we have encountered in developing a practical video ...
arxiv  

Universal distortion function for steganography in an arbitrary domain

open access: yesEURASIP Journal on Information Security, 2014
Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function.
Vojtech Holub   +2 more
semanticscholar   +1 more source

Natural Steganography: cover-source switching for better steganography [PDF]

open access: yes, 2016
This paper proposes a new steganographic scheme relying on the principle of cover-source switching, the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography, considers the sensor noise naturally present in the raw images and uses the principle that, by the addition ...
openaire   +3 more sources

Z2Z4-Additive Perdect Codes in Steganography [PDF]

open access: yes, 2011
Steganography is an information hiding application which aims to hide secret data imperceptibly into a cover object. In this paper, we describe a novel coding method based on Z2Z4-additive codes in which data is embedded by distorting each cover ...
Rifà Coma, Josep   +2 more
core  

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

Home - About - Disclaimer - Privacy