Results 61 to 70 of about 56,459 (364)

Characterizing Parental Concerns About Lasting Impacts of Treatment in Children With B‐Acute Lymphoblastic Leukemia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker   +7 more
wiley   +1 more source

Forensic analysis of video steganography tools [PDF]

open access: yesPeerJ Computer Science, 2015
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence.
Thomas Sloan, Julio Hernandez-Castro
doaj   +2 more sources

Convolutional Neural Network Steganalysis's Application to Steganography

open access: yes, 2017
This paper presents a novel approach to increase the performance bounds of image steganography under the criteria of minimizing distortion. The proposed approach utilizes a steganalysis convolutional neural network (CNN) framework to understand an image ...
Agarwal, Chirag   +3 more
core   +1 more source

Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]

open access: yes, 2020
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee   +7 more
core  

Grey-Box Steganography

open access: yesTheoretical Computer Science, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liśkiewicz, Maciej   +2 more
openaire   +1 more source

A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method

open access: yesIEEE Access, 2022
Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks.
Shahid Rahman   +5 more
semanticscholar   +1 more source

Predicting the Future Burden of Renal Replacement Therapy in Türkiye Using National Registry Data and Comparative Modeling Approaches

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül   +2 more
wiley   +1 more source

A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264

open access: yesSensors, 2020
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that ...
Mingyuan Cao, Lihua Tian, Chen Li
doaj   +1 more source

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

open access: yes, 2015
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg   +3 more
core   +1 more source

Steganography in beautified mages

open access: yesMathematical Biosciences and Engineering, 2019
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images.
Liyun Liu   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy