52   Artículos

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mark Burgin    
Knowledge and data representations are important for artificial intelligence (AI), as well as for intelligence in general. Intelligent functioning presupposes efficient operation with knowledge and data representations in particular. At the same time, it... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Fahd Alduais, Nashat Ali Almasria, Abeer Samara and Ali Masadeh    
The purpose of this study was to examine the relationship between the conciseness and complexity of financial disclosures and market reactions, using the annual reports of Chinese-listed B-share companies over the period 2006?2018. We employed a set of s... ver más
Revista: International Journal of Financial Studies    Formato: Electrónico

 
en línea
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung    
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi     Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ... ver más

 
en línea
Max Friedrich and Mark Vollrath    
The envisioned introduction of autonomous Small Unmanned Aircraft Systems (sUAS) into low-altitude urban airspace necessitates high levels of system safety. Despite increased system autonomy, humans will most likely remain an essential component in assur... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Pedro Molina-Rodríguez-Navas and Johamna Muñoz Lalinde    
Information on the management of local administrations and the actions of the political leaders who govern them is essential for citizens to exercise their political rights. It is therefore necessary for these administrations to provide quality informati... ver más
Revista: Information    Formato: Electrónico

 
en línea
Chin-Chen Chang, Jui-Feng Chang, Wei-Jiun Kao and Ji-Hwei Horng    
During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »