|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da...
ver más
|
|
|
|
|
|
|
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ...
ver más
|
|
|
|
|
|
|
Mark Burgin
Knowledge and data representations are important for artificial intelligence (AI), as well as for intelligence in general. Intelligent functioning presupposes efficient operation with knowledge and data representations in particular. At the same time, it...
ver más
|
|
|
|
|
|
|
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ...
ver más
|
|
|
|
|
|
|
Fahd Alduais, Nashat Ali Almasria, Abeer Samara and Ali Masadeh
The purpose of this study was to examine the relationship between the conciseness and complexity of financial disclosures and market reactions, using the annual reports of Chinese-listed B-share companies over the period 2006?2018. We employed a set of s...
ver más
|
|
|
|
|
|
|
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi
Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ...
ver más
|
|
|
|
|
|
|
Max Friedrich and Mark Vollrath
The envisioned introduction of autonomous Small Unmanned Aircraft Systems (sUAS) into low-altitude urban airspace necessitates high levels of system safety. Despite increased system autonomy, humans will most likely remain an essential component in assur...
ver más
|
|
|
|
|
|
|
Pedro Molina-Rodríguez-Navas and Johamna Muñoz Lalinde
Information on the management of local administrations and the actions of the political leaders who govern them is essential for citizens to exercise their political rights. It is therefore necessary for these administrations to provide quality informati...
ver más
|
|
|
|
|
|
|
Chin-Chen Chang, Jui-Feng Chang, Wei-Jiun Kao and Ji-Hwei Horng
During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression ...
ver más
|
|
|
|