|
|
|
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da...
ver más
|
|
|
|
|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Marco Botta, Davide Cavagnino and Alessandro Druetto
Base45 encodes pairs of octets using 3 characters from an alphabet of 45 printable symbols. Previous works showed the ability to hide payload data into encoded strings by exploiting the unused configurations of the Base45 encoding. In this paper, we pres...
ver más
|
|
|
|
|
|
|
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat...
ver más
|
|
|
|
|
|
|
Rui-Hua Liu and Quan Zhou
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni...
ver más
|
|
|
|
|
|
|
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ...
ver más
|
|
|
|
|
|
|
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ...
ver más
|
|
|
|
|
|
|
Saurabh Agarwal and Ki-Hyun Jung
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-...
ver más
|
|
|
|
|
|
|
Mark Burgin
Knowledge and data representations are important for artificial intelligence (AI), as well as for intelligence in general. Intelligent functioning presupposes efficient operation with knowledge and data representations in particular. At the same time, it...
ver más
|
|
|
|
|
|
|
Fahd Alduais, Nashat Ali Almasria, Abeer Samara and Ali Masadeh
The purpose of this study was to examine the relationship between the conciseness and complexity of financial disclosures and market reactions, using the annual reports of Chinese-listed B-share companies over the period 2006?2018. We employed a set of s...
ver más
|
|
|
|