26   Artículos

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rui-Hua Liu and Quan Zhou    
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Marco Botta, Davide Cavagnino and Alessandro Druetto    
Base45 encodes pairs of octets using 3 characters from an alphabet of 45 printable symbols. Previous works showed the ability to hide payload data into encoded strings by exploiting the unused configurations of the Base45 encoding. In this paper, we pres... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung    
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ching-Yu Yang and Ja-Ling Wu    
During medical treatment, personal privacy is involved and must be protected. Healthcare institutions have to keep medical images or health information secret unless they have permission from the data owner to disclose them. Reversible data hiding (RDH) ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Federico Iriarte-Ahón     Pág. 45 - 62
The present article presents a literature review on the relationship between knowledge donating and hiding strategies as an organizational basis for intersectoral collaboration. The literature finds that sharing or hiding behavior is a question of indivi... ver más
Revista: Journal of Business    Formato: Electrónico

 
en línea
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng    
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Peiyuan Qiu, Jialiang Gao, Li Yu and Feng Lu    
A Geographic Knowledge Graph (GeoKG) links geographic relation triplets into a large-scale semantic network utilizing the semantic of geo-entities and geo-relations. Unfortunately, the sparsity of geo-related information distribution on the web leads to ... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »