Results 331 to 340 of about 53,608 (389)

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism. [PDF]

open access: yesPLoS One
Al Sibahee MA   +7 more
europepmc   +1 more source

Empowering young minds through STEM education: Engaging high schoolers in Ghana through medical physics

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To promote diversity in Science, Technology, Engineering, and Mathematics (STEM), an educational presentation and hands‐on session was organised to raise awareness of STEM career opportunities among high school girls to introduce the students to the field of medical physics. Materials and Methods The study involved 65 first‐year Senior
Afua A. Yorke   +7 more
wiley   +1 more source

Comprehensive end‐to‐end dosimetry audit for stereotactic body radiotherapy in spine, lung, and soft tissue

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To create and conduct a comprehensive onsite end‐to‐end dosimetry audit to assess treatment accuracy of spine, lung, and soft tissue Stereotactic Body Radiotherapy (SBRT) across Australian and New Zealand (ANZ) radiotherapy centers. Methods The Australian Clinical Dosimetry Service (ACDS) anthropomorphic thorax phantom underwent a CT ...
Maddison Shaw   +8 more
wiley   +1 more source

Covert Communication through Robust Fragment Hiding in a Large Number of Images. [PDF]

open access: yesSensors (Basel)
Wang P   +6 more
europepmc   +1 more source

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu
exaly   +4 more sources

Vectorial Compound Metapixels for Arbitrary Nonorthogonal Polarization Steganography

Advanced Materials, 2021
Malus’ law regulating the intensity of light when passed through a polarizer, forms the solid basis for image steganography based on orthogonal polarizations of light to convey hidden information without adverse perceptions, which underpins important ...
Tan Shi, Xiangping Li, Zi-lan Deng
exaly   +2 more sources

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features

IEEE Transactions on Dependable and Secure Computing, 2022
With the coming era of cloud technology, cloud storage is an emerging technology to store massive digital images, which provides steganography a new fashion to embed secret information into massive images. Specifically, a resourceful steganographer could
Xin Liao   +3 more
semanticscholar   +1 more source

Channel Attention Image Steganography With Generative Adversarial Networks

IEEE Transactions on Network Science and Engineering, 2022
Recently, extensive research has revealed the enormous potential of deep learning in the application of image steganography. However, some defects still exist in previous studies on deep learning-based steganography. In this paper, we propose a novel end-
Jin-Lan Tan   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy