Results 61 to 70 of about 7,152 (277)

Ceaseless steganographic approaches in machine learning

open access: yesMeasurement: Sensors, 2023
Steganography is the showing of disguising a message inside another message or a certifiable article like message, picture, or video is covered inside another record, message, picture, or video.
Daniya Sakkeena S   +3 more
doaj   +1 more source

Efficient And Robust Video Steganography Algorithms For Secure Data Communication [PDF]

open access: yes, 2017
Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganography method relies on the imperceptibility, embedding capacity, and robustness ...
Elleithy, Khaled M., Mstafa, Ramadhan J.
core  

Multidimensional Profiling of MRI‐Negative Temporal Lobe Epilepsy Uncovers Distinct Phenotypes

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Although hippocampal sclerosis (TLE‐HS) represents the most frequent cause of temporal lobe epilepsy (TLE), up to 30% of patients show no lesion on visual MRI inspection (TLE‐MRIneg). These cases pose diagnostic and therapeutic challenges and are underrepresented in surgical series.
Alice Ballerini   +28 more
wiley   +1 more source

Use Cutting Enzymes to Encode the Secret Message [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2014
Researchers begin to explore new methods to manage the huge amount of data shared over the Internet, in order to use them more efficiently and safely, One of the ways that is raised nowadays is Steganography, The art of information hiding within ...
Saadoun A.
doaj   +1 more source

Steganography in RGB Images Using Adjacent Mean

open access: yesIEEE Access, 2021
Steganography is the practice of hiding information or data in a seemingly innocuous cover medium, such as message, file, image, audio, and video. In the past decades, many approaches of steganography in images were proposed for various applications.
Yun-Hsin Chuang   +3 more
doaj   +1 more source

Cognitive Behavioral Therapy for Youth With Childhood‐Onset Lupus: A Randomized Clinical Trial

open access: yesArthritis Care &Research, EarlyView.
Objective Our objective was to determine the feasibility and acceptability of the Treatment and Education Approach for Childhood‐Onset Lupus (TEACH), a six‐session cognitive behavioral intervention addressing depressive, fatigue, and pain symptoms, delivered remotely to individual youth with lupus by a trained interventionist.
Natoshia R. Cunningham   +29 more
wiley   +1 more source

Hiding information in image using circular distribuition [PDF]

open access: yes, 2016
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core  

Integrating Patient‐Reported Quality Measures in Systemic Lupus Erythematosus: Development of the American College of Rheumatology Implementation Guide

open access: yesArthritis Care &Research, EarlyView.
Objective To support high‐quality, patient‐centered care for systemic lupus erythematosus (SLE), the American College of Rheumatology (ACR) developed evidence‐based measures incorporating clinical and patient‐reported outcome measures (PROMs). Using the Consolidated Framework for Implementation Research (CFIR), we conducted semistructured interviews ...
Catherine Nasrallah   +13 more
wiley   +1 more source

Stego-STFAN: A Novel Neural Network for Video Steganography

open access: yesComputers
This article presents an innovative approach to video steganography called Stego-STFAN, as by using a cheap model process to use the temporal and spatial domains together, they end up presenting fine adjustments in each frame, the Stego-STFAN had a PSNRc
Guilherme Fay Vergara   +8 more
doaj   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

open access: yes, 2007
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Moulin, Pierre, Wang, Ying
core   +4 more sources

Home - About - Disclaimer - Privacy