|
|
|
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da...
ver más
|
|
|
|
|
|
|
Rui-Hua Liu and Quan Zhou
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni...
ver más
|
|
|
|
|
|
|
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat...
ver más
|
|
|
|
|
|
|
Marco Botta, Davide Cavagnino and Alessandro Druetto
Base45 encodes pairs of octets using 3 characters from an alphabet of 45 printable symbols. Previous works showed the ability to hide payload data into encoded strings by exploiting the unused configurations of the Base45 encoding. In this paper, we pres...
ver más
|
|
|
|
|
|
|
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ...
ver más
|
|
|
|
|
|
|
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ...
ver más
|
|
|
|
|
|
|
Ching-Yu Yang and Ja-Ling Wu
During medical treatment, personal privacy is involved and must be protected. Healthcare institutions have to keep medical images or health information secret unless they have permission from the data owner to disclose them. Reversible data hiding (RDH) ...
ver más
|
|
|
|
|
|
|
Federico Iriarte-Ahón
Pág. 45 - 62
The present article presents a literature review on the relationship between knowledge donating and hiding strategies as an organizational basis for intersectoral collaboration. The literature finds that sharing or hiding behavior is a question of indivi...
ver más
|
|
|
|
|
|
|
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ...
ver más
|
|
|
|
|
|
|
Peiyuan Qiu, Jialiang Gao, Li Yu and Feng Lu
A Geographic Knowledge Graph (GeoKG) links geographic relation triplets into a large-scale semantic network utilizing the semantic of geo-entities and geo-relations. Unfortunately, the sparsity of geo-related information distribution on the web leads to ...
ver más
|
|
|
|