Results 61 to 70 of about 56,459 (364)
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker +7 more
wiley +1 more source
Forensic analysis of video steganography tools [PDF]
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence.
Thomas Sloan, Julio Hernandez-Castro
doaj +2 more sources
Convolutional Neural Network Steganalysis's Application to Steganography
This paper presents a novel approach to increase the performance bounds of image steganography under the criteria of minimizing distortion. The proposed approach utilizes a steganalysis convolutional neural network (CNN) framework to understand an image ...
Agarwal, Chirag +3 more
core +1 more source
Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee +7 more
core
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liśkiewicz, Maciej +2 more
openaire +1 more source
Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks.
Shahid Rahman +5 more
semanticscholar +1 more source
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül +2 more
wiley +1 more source
A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that ...
Mingyuan Cao, Lihua Tian, Chen Li
doaj +1 more source
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg +3 more
core +1 more source
Steganography in beautified mages
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images.
Liyun Liu +4 more
openaire +3 more sources

