Transactions on Data Hiding and Multimedia Security IX
Special Issue on Visual Cryptography
Article
This paper introduces an advanced inventory replenishment optimization approach tailored for the Physical Internet (PI), addressing the dynamic and complex nature of this environment. We propose a hybrid Simul...
Article
Osteosarcoma is a malignant bone tumor that is prone to metastasize early and primarily affects children and adolescents. Cell migration-inducing protein (CEMIP) plays a crucial role in the progression and mal...
Article
Cold spells have been associated with specific diseases. However, there is insufficient scientific evidence on the effects of cold spells on out-of-hospital cardiac arrest (OHCA). Data on OHCA cases and on met...
Article
Osteosarcoma is a malignant tumor of bone and soft tissue in adolescents. Due to its tumor biological behavior pattern, osteosarcoma usually generates poor prognosis. Autophagy is an important self-defense mec...
Article
Osteosarcoma (OS) is the most common primary malignant bone tumor mainly occurring in children and adolescents. In past decades, studies revealed that PARK2 was a vital tumor suppressor gene in many malignant sol...
Chapter and Conference Paper
In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...
Article
The integration of regenerated cartilage with surrounding native cartilage is a major challenge for the success of cartilage tissue-engineering strategies. The purpose of this study is to investigate whether i...
Book
Article
Mesenchymal stem cell (MSC)-based therapy has great potential for tissue regeneration. However, being able to monitor the in vivo behavior of implanted MSCs and understand the fate of these cells is necessary ...
Chapter
Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More...
Chapter and Conference Paper
Cloud computing has been introduced as a tool for improving IT proficiency and business responsiveness for organizations as it delivers flexible hardware and software services as well as providing an array of ...
Article
Osteoarthritis (OA) is a common disorder and the restoration of the diseased articular cartilage in patients with OA is still a challenge for researchers and clinicians. Currently, a variety of experimental st...
Article
Cartilage has a limited self-repair capability and the repair of large cartilage defects remains a challenge in clinic. This study aimed to investigate the effect of mesenchymal stem cells (MSCs) loaded three-...
Chapter and Conference Paper
One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an imag...
Article
This paper contains a survey on aspects of visual event computing. We start by presenting events and their classifications, and continue with discussing the problem of capturing events in terms of photographs,...
Article
Copies are somehow a subset of near-duplicates, but the approaches extensively employed in near-duplicate retrieval only obtain rough and imprecise query results. Therefore a fine-search scheme is proposed to ...
Chapter and Conference Paper
Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is...
Chapter and Conference Paper
Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against dig...
Chapter
In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular ...
Chapter
Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides i...