Results 71 to 80 of about 53,608 (389)
Using Facebook for Image Steganography
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas+3 more
core +1 more source
A Survey On Semantic Steganography Systems [PDF]
Steganography is the practice of concealing a message within some other carrier or cover message. It is used to allow the sending of hidden information through communication channels where third parties would only be aware of the explicit information in the carrier message.
arxiv
On the predictability in reversible steganography
Artificial neural networks have advanced the frontiers of reversible steganography. The core strength of neural networks is the ability to render accurate predictions for a bewildering variety of data. Residual modulation is recognised as the most advanced reversible steganographic algorithm for digital images. The pivot of this algorithm is predictive
Ching-Chun Chang+4 more
openaire +2 more sources
How Hidden Can Be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech+2 more
core +1 more source
This study examines the demographic dynamics of two seabird populations on Tromelin Island, 15 years after the eradication of brown rats. The results indicate that these populations are in good health and are expected to continue growing until breeding sites are saturated in about a century.
Merlène Saunier+6 more
wiley +1 more source
Multi-Level Steganography: Improving Hidden Communication in Networks
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech+2 more
core +2 more sources
The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley +1 more source
Survey of the Use of Steganography over the Internet [PDF]
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof.
Lavinia Mihaela DINCA
doaj
Taurine promotes glucagon‐like peptide‐1 secretion in enteroendocrine L cells
Taurine, a sulfur‐containing amino acid, is likely taken up by enteroendocrine L cells via the taurine transporter. This process increases the levels of cytosolic ATP. The increase in intracellular Ca2+ concentrations and glucagon‐like peptide‐1 secretion through membrane depolarization is caused by the closure of ATP‐sensitive potassium channels ...
Yuri Osuga+6 more
wiley +1 more source
A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode
Existing video steganography puts much emphasis on the design of algorithms such as mapping rules or distortion functions, thereby ignoring the selection of cover to embed secret information.
Jie Wang+3 more
doaj +1 more source