Results 51 to 60 of about 7,152 (277)

Comparison of Video Steganography Methods for Watermark Embedding

open access: yesApplied Computer Systems, 2016
The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and ...
Griberman David, Rusakov Pavel
doaj   +1 more source

A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector

open access: yesIEEE Access, 2020
Recent developments in the speed of the Internet and information technology have made the rapid exchange of multimedia information possible. However, these developments in technology lead to violations of information security and private information ...
Ramadhan J. Mstafa   +3 more
doaj   +1 more source

Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler   +20 more
wiley   +1 more source

Stealthy Plaintext [PDF]

open access: yes, 2012
Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text.
Manjunath, Naidele Katrumane
core   +1 more source

Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende   +26 more
wiley   +1 more source

IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS

open access: yesAl-Ulum
Protecting information during transmission is crucial to prevent unauthorized access. Steganography and cryptography are two commonly used methods for securing messages from illegal interception.
Ibnu Faiz Abdillah   +2 more
doaj   +1 more source

A Novel LSB Steganography Technique Using Image Segmentation [PDF]

open access: yesJournal of Universal Computer Science
Steganography is a process to hide data inside a cover file mostly used in media files like image, video, and audio files. Least significant bit (LSB) steganography is a technique where the least significant bits of pixels are used for information hiding.
Yasir Yakup Demircan, Serhat Ozekes
doaj   +3 more sources

A Graphical Based Video Steganography

open access: yes, 2021
In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases.
Bandyopadhyay, Samir   +2 more
openaire   +2 more sources

Vestibular Patient Journey: Insights From Vestibular Disorders Association (VeDA) Registry

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Vestibular symptoms impose a high burden of disability. Understanding real‐world diagnostic and treatment pathways can identify care gaps and guide interventions. We aimed to characterize symptom profiles, diagnostic trends, provider involvement, and treatment patterns in vestibular disorders.
Ali Rafati   +10 more
wiley   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

Home - About - Disclaimer - Privacy