Results 71 to 80 of about 53,608 (389)

Using Facebook for Image Steganography

open access: yes, 2015
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas   +3 more
core   +1 more source

A Survey On Semantic Steganography Systems [PDF]

open access: yesarXiv, 2022
Steganography is the practice of concealing a message within some other carrier or cover message. It is used to allow the sending of hidden information through communication channels where third parties would only be aware of the explicit information in the carrier message.
arxiv  

On the predictability in reversible steganography

open access: yesTelecommunication Systems, 2023
Artificial neural networks have advanced the frontiers of reversible steganography. The core strength of neural networks is the ability to render accurate predictions for a bewildering variety of data. Residual modulation is recognised as the most advanced reversible steganographic algorithm for digital images. The pivot of this algorithm is predictive
Ching-Chun Chang   +4 more
openaire   +2 more sources

How Hidden Can Be Even More Hidden?

open access: yes, 2011
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech   +2 more
core   +1 more source

Combining transient dynamics and logistic‐asymptotic growth to study the recovery of two seabird populations after rat eradication

open access: yesPopulation Ecology, EarlyView.
This study examines the demographic dynamics of two seabird populations on Tromelin Island, 15 years after the eradication of brown rats. The results indicate that these populations are in good health and are expected to continue growing until breeding sites are saturated in about a century.
Merlène Saunier   +6 more
wiley   +1 more source

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +2 more sources

The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada

open access: yesPopulation Ecology, EarlyView.
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley   +1 more source

Survey of the Use of Steganography over the Internet [PDF]

open access: yesInformatică economică, 2011
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof.
Lavinia Mihaela DINCA
doaj  

Taurine promotes glucagon‐like peptide‐1 secretion in enteroendocrine L cells

open access: yesFEBS Letters, EarlyView.
Taurine, a sulfur‐containing amino acid, is likely taken up by enteroendocrine L cells via the taurine transporter. This process increases the levels of cytosolic ATP. The increase in intracellular Ca2+ concentrations and glucagon‐like peptide‐1 secretion through membrane depolarization is caused by the closure of ATP‐sensitive potassium channels ...
Yuri Osuga   +6 more
wiley   +1 more source

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode

open access: yesIEEE Access, 2019
Existing video steganography puts much emphasis on the design of algorithms such as mapping rules or distortion functions, thereby ignoring the selection of cover to embed secret information.
Jie Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy