41   Artículos

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Rui-Hua Liu and Quan Zhou    
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng    
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Marco Botta, Davide Cavagnino and Alessandro Druetto    
Base45 encodes pairs of octets using 3 characters from an alphabet of 45 printable symbols. Previous works showed the ability to hide payload data into encoded strings by exploiting the unused configurations of the Base45 encoding. In this paper, we pres... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Habiba Sultana, A. H. M. Kamal, Gahangir Hossain and Muhammad Ashad Kabir    
In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in this paper. This m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wanqi Wang and Wenge Qiu    
Large deformations can easily occur when tunneling through weak surrounding rock with high underground stresses. Under high-stress environments, the surrounding rock stores a large amount of strain energy, and the strain energy stored in the soft and wea... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung    
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »