We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 121-140 of 8,236 results
  1. A Block-Based Data Hiding Technique Using Convolutional Neural Network

    In this paper, we propose a block-based data hiding method using convolutional neural network. The capability of a convolutional neural network to...
    Conference paper 2022
  2. An Information Hiding Algorithm for Iris Features

    Recently, iris identification technology have attracted much interests in the field of automatic biometric identification, taking uniqueness,...
    Jiahui Feng, Hongbin Ma, ... Hong Chen in Communications, Signal Processing, and Systems
    Conference paper 2020
  3. An Enhanced Pixel Intensity Range-Based Reversible Data Hiding Scheme for Interpolated Images

    Singh, Rama Vaish, AnkitaThis paper line ups an improved interpolation-based reversible data hiding technique (IRDH). The modified neighbor mean...
    Rama Singh, Ankita Vaish in Congress on Intelligent Systems
    Conference paper 2022
  4. Information Security Through Encrypted Domain Data Hiding

    In this contemporary world of internet, information security is the most important issue because while transmitting and receiving any information...
    Vikas Kumar, Prateek Muchhal, V. Thanikasiselvan in Innovative Data Communication Technologies and Application
    Conference paper 2020
  5. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

    Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the...

    Sahaya Stalin Jose G, Sugitha G, ... Preethi B. C in Peer-to-Peer Networking and Applications
    Article 06 February 2024
  6. Digital Watermarking Hiding Technology for Copyright Information

    With the wide application of information technology and the gradual development of army informationization construction, especially with the...
    Conference paper 2020
  7. Highly Secured Steganography Method for Image Communication using Random Byte Hiding and Confused & Diffused Encryption

    This paper propounds a new notion for a secured method for image communication using random byte hiding (RBH) technique with confused and diffused...
    S. Aswath, R. S. Valarmathi, ... M. Pandiyarajan in Computer Networks and Inventive Communication Technologies
    Conference paper 2022
  8. Information Hiding Using Quantum Image Processing State of Art Review

    The bottleneck of digital image processing field narrows down to the memory consumption and the processing speed problems, which can be resolved by...
    S. Thenmozhi, K. BalaSubramanya, ... B. Vikas in Inventive Computation and Information Technologies
    Conference paper 2021
  9. High-Capacity Reversible Data Hiding in Encrypted Images by Second MSB Replacement

    The technique of data hiding reversibly in encrypted images may be considered as an efficient method that can be used to hide data within an image...
    Conference paper 2021
  10. A Data Hiding Technology by Applying Interpolation in Extended Local Binary Pattern

    This paper proposes a data hiding technology by applying interpolation in Extended Local Binary Pattern (ELBP). The proposed method uses...
    Chapter 2022
  11. Control of Multi-Position System for Structural and Information Monitoring of Airspace

    Abstract

    The principles of structural and information monitoring of airspace by a multi-position system of information sensors were analyzed....

    V. A. Shevtsov, A. V. Timoshenko, ... S. N. Razin’kov in Russian Aeronautics
    Article 01 January 2023
  12. Reversible hiding method for interpolation images featuring a multilayer center folding strategy

    In 2015, Lu proposed the ( k , F 1 ) interpolation-based reversible hiding scheme by using the center folding strategy (CFS) to improve the image quality...

    Tzu-Chuen Lu, Shi-Ru Huang, Shu-Wen Huang in Soft Computing
    Article 18 July 2020
  13. Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting

    Since the last decade, data transmission has kept develo** faster than ever. With the support of online systems and mobile devices, the development...
    Yoga Samudra, Tohari Ahmad in Hybrid Intelligent Systems
    Conference paper 2022
  14. Generative Information Hiding Method Based on Adversarial Networks

    Traditional Steganography need to modify the carrier image to hide information, which will leave traces of rewriting, then eventually be perceived by...
    Conference paper 2020
  15. An Extended Wavelet Based Federated Convolutional Quotient Multipixel Value Differencing for Secured Data Transmission Outline

    In a distributed communication channel, the safety of photographic files is a challenging task. To protect the image information, various approaches...

    D. Shivaramakrishna, M. Nagaratna in Wireless Personal Communications
    Article 30 May 2024
  16. Threat analysis for space information network based on network security attributes: a review

    Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is...

    Xuesong Wu, Ye Du, ... Tianshuai Zheng in Complex & Intelligent Systems
    Article Open access 28 November 2022
  17. Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm

    In today’s interconnected world, massive amounts of data in various forms are transferred across the Internet in a variety of ways for various...
    Conference paper 2024
  18. Information Security in Integrated Circuits

    Information security is the foundation of information systems and the forever theme of the information society. The main issues of information...
    Chaohui Wang, Qinsheng Wang, Qian Peng in Handbook of Integrated Circuit Industry
    Reference work entry 2024
  19. Information Theory

    Main concepts of Information Theory are introduced, by following the spirit of Shannon’s original paper of 1948. Firstly, the link between the notion...
    Vincenzo Manca, Vincenzo Bonnici in Infogenomics
    Chapter 2023
  20. Discrete Wavelet Transform-Based Reversible Data Hiding in Encrypted Images

    In the era of multimedia technology, not only reinstatement of the original media without any loss of information is required but also the security...
    Sara Ahmed, Ruchi Agarwal, Manoj Kumar in Proceedings of Academia-Industry Consortium for Data Science
    Conference paper 2022
Did you find what you were looking for? Share feedback.