![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
214 Result(s)
-
Article
A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility
Owing to life style changes during COVID, communication channels were forced to change. Online services ramped up to replace traditional services. It became daily practice for most of us that documents, files,...
-
Article
Joint learning of fuzzy embedded clustering and non-negative spectral clustering
Fuzzy k-means clustering is widely acknowledged for its remarkable performance in data clustering. However, its effectiveness must improve when dealing with high-dimensional data characterized by complex distr...
-
Article
Reversible data hiding in encrypted images with block-based bit-plane reallocation
As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible data hiding in encrypted images (RDHEI) is an effective method...
-
Article
Recent progress in unraveling cardiovascular complications associated with primary aldosteronism: a succinct review
This comprehensive review offers a thorough exploration of recent advancements in our understanding of the intricate cardiovascular complications associated with Primary Aldosteronism (PA). PA encompasses a sp...
-
Article
Reversible data hiding scheme using prediction neural network and adaptive modulation map**
Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation map**. This p...
-
Article
Data hiding with thumbnail-preserving encryption for cloud medical images
To serve a convenient healthcare network, storing medical images and diagnosis records in the cloud is a straightforward solution. Encrypting the medical images before uploading them to the cloud is a trivial ...
-
Article
Aldosteronism is associated with more severe cerebral small vessel disease in hypertensive intracerebral hemorrhage
Primary aldosteronism is associated with various types of cardiovascular and cerebrovascular damage independently of hypertension. Although chronic hypertension and related cerebral arteriosclerosis are the ma...
-
Article
An effective compressed image authentication scheme based on N-variant AMBTC
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation co...
-
Article
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preserva...
-
Article
Open AccessOptimizing adrenal vein sampling in primary aldosteronism subty** through LC–MS/MS and secretion ratios of aldosterone, 18-oxocortisol, and 18-hydroxycortisol
Adrenal venous sampling (AVS) is the gold standard for identifying curable unilateral aldosterone excess in primary aldosteronism (PA). Studies have demonstrated the value of steroid profiling through liquid c...
-
Article
Overlapped (7,4) hamming code for large-capacity and low-loss data hiding
A novel data hiding method based on overlapped (7,4) Hamming code is proposed in this paper. 11-bit codewords are constructed from two overlapped (7,4) Hamming codes, and then a look-up table of 11-bit codewor...
-
Article
Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...
-
Chapter and Conference Paper
Reversible Data Hiding Based on Bidirectional Generalized Integer Transform
This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based...
-
Article
Open AccessNetwork abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder
Fog computing, as a new distributed computing framework, extends the tasks originally done in the cloud data center to the edge of the network and brings more serious security challenges while providing conven...
-
Article
Open AccessSKDStream: a dynamic clustering algorithm on time-decaying data stream
Data stream is a type of data that continue to grow over time. For example, network security data stream will constantly be generated in the field of data security, and encrypted data stream will be generated ...
-
Article
Open AccessABOS: an attention-based one-stage framework for person search
Person search is of great significance to public safety research, such as crime surveillance, video surveillance and security. Person search is a method of locating and identifying the queried person from a co...
-
Article
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding
With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing data hiding methods for encrypted images mainly focus on impr...
-
Article
CSST-Net: an arbitrary image style transfer network of coverless steganography
A traditional image steganography embeds secret information into a cover image to generate a secret-embedded image. The modification traces imposed on the cover image can be easily detected by steganalysis too...
-
Article
Open AccessRadiomics utilization to differentiate nonfunctional adenoma in essential hypertension and functional adenoma in primary aldosteronism
We performed the present study to investigate the role of computed tomography (CT) radiomics in differentiating nonfunctional adenoma and aldosterone-producing adenoma (APA) and outcome prediction in patients ...
-
Article
A reversible and authenticable secret sharing scheme using dual images
Reversible data hiding (RDH) is a steganographic method that can restore the cover medium after extracting the embedded secret data. This work proposes a novel RDH scheme based on turtle shell (TS) reference m...