Results 51 to 60 of about 56,459 (364)

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models

open access: yesIEEE Transactions on Dependable and Secure Computing, 2022
Steganography is the art and science of hiding secret messages in public communication so that the presence of secret messages cannot be detected. There are two distribution-preserving steganographic frameworks, one is sampler-based and the other is ...
Kejiang Chen   +5 more
semanticscholar   +1 more source

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Translation-based steganography

open access: yesJournal of Computer Security, 2005
This paper investigates systems that steganographically embed information in the “noise” created by automatic translation of natural language documents. The main thrust of the work focuses on two problems – generation of plausible steganographic texts and avoiding transmission of the original source for stego objects. Because the inherent redundancy of
Grothoff, Christian   +4 more
openaire   +3 more sources

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

Developmental Disorders in Children Recently Diagnosed With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag   +5 more
wiley   +1 more source

Image Steganography

open access: yes, 2021
Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties.
Sana Parveen K   +3 more
openaire   +3 more sources

Applications of Deep Learning in Image Steganography [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics
The current paper presents the concept of steganography, with a focus on image steganography. It outlines a few relevant techniques for image steganography. Provides implementation details and a comparative evaluation of design and results.
Adrian Doroiman
doaj   +1 more source

Universal Image Steganalytic Method [PDF]

open access: yes, 2014
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods.
Banoci, V.   +3 more
core   +1 more source

How Hidden Can Be Even More Hidden?

open access: yes, 2011
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy