-
5221
Steganography based on parameters’ disturbance of spatial image transform
Published 2017-10-01“…In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in real world.How to use image process to improve steganography has not been systematically studied.Taking spatial image transform for consideration,a parameters’ disturbance model was presented,which could hide the noise taken by steganography in the pixel fluctuation due to the disturbance.Meanwhile,it would introduce cover source mismatch for a steganalyzer.The experimental results show that,compared with using traditional image database,it can significantly enhance the security of steganography algorithms and accommodative to the real world situation.…”
Get full text
Article -
5222
Lightweight integrity verification scheme for cloud based group data
Published 2016-10-01“…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
Get full text
Article -
5223
DGANS:robustness image steganography model based on double GAN
Published 2020-01-01“…Deep convolutional neural networks can be effectively applied to large-capacity image steganography,but the research on their robustness is rarely reported.The DGANS (double-GAN-based steganography) applies the deep learning framework in image steganography,which is optimized to resist small geometric distortions so as to improve the model’s robustness.DGANS is made up of two consecutive generative adversarial networks that can hide a grayscale image into another color or grayscale image of the same size and can restore it later.The generated stego-images are augmented and used to further train and strengthen the reveal network so as to make it adaptive to small geometric distortion of input images.Experimental results suggest that DGANS can not only realize high-capacity image steganography,but also can resist geometric attacks within certain range,which demonstrates better robustness than similar models.…”
Get full text
Article -
5224
Le dilemme du Parti républicain dans le Wisconsin suite à l’élection de Trump
Published 2018-09-01“…The results of the 2016 presidential election seem to indicate the Republican Party’s completion of its conquest of rural America. Yet, those results hide significant voting patterns that point to a dilemma the Party will have to address if it is to maintain electoral viability. …”
Get full text
Article -
5225
Prix des captifs, prix des esclaves : l’estimation du « prix de l’Homme » dans l’Antiquité tardive
Published 2014-12-01“…But, these laws only applied marginally and, as a result, could not hide that the estimated price of enslaved individuals and the price of freedom both had a symbolic aspect.…”
Get full text
Article -
5226
Rougissement littéraire
Published 2024-12-01“…In the different stages of shame, from paralysis to the desire to hide or forget everything to aggression, the analysis opens up the necessary room for reflection towards action that can overcome shame in its actual injustice…”
Get full text
Article -
5227
New construction of secure range query on encrypted data in cloud computing
Published 2015-02-01“…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
Get full text
Article -
5228
Proper Hand Washing for School Children
Published 2006-03-01“… Germs can hide under long fingernails and on dirty hands. Keeping your fingernails short and washing your hands often, are the most important things you can do to stop germs from making you sick. …”
Get full text
Article -
5229
Visibilité des aménités, invisibilisation des inondations. L’inondation dans l’écoquartier à La Riche (agglomération de Tours)
Published 2023-12-01“…The eco-district labelling process helps to negotiate and hide the risk of flooding, by highlighting the environmental qualities of the area.…”
Get full text
Article -
5230
Watermarking algorithm for image authentication based on second generation Bandelet
Published 2010-01-01“…A watermarking algorithm for image authentication was designed,which was based on second generation Bandelet translation and statistical model.The image directional flow was constructed by using Bandelet,and it could depict the characteristic of the image.By applying noise visibility function,the noise visibility intensity algorithm which was based on Gaussian statistical models was proposed.The blocks of image which contain more texture information were selected to hide the image directional flow,based on the noise visibility intensity algorithm.The image was authen-ticated through comparing the hiding information and the carrier image directional flow created by Bandelet.Experimen-tal results show that the algorithm can resist the JPEG compression and noise attack strongly and guarantee the quality of the sight.It is a blind detection algorithm,and this algorithm has high concealment performance and security.…”
Get full text
Article -
5231
Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security
Published 2013-06-01“…These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. …”
Get full text
Article -
5232
Proper Hand Washing for School Children
Published 2006-03-01“… Germs can hide under long fingernails and on dirty hands. Keeping your fingernails short and washing your hands often, are the most important things you can do to stop germs from making you sick. …”
Get full text
Article -
5233
Tracer l’animal dans les nouvelles de Rick Bass
Published 2017-02-01“…Through descriptions of animals that try to hide from man’s gaze, Rick Bass creates a scriptural and physical approach that not only allows the author to redefine the descriptive mode, but also renews the relations between man and the nonhuman world. …”
Get full text
Article -
5234
Autosomal Recessive Non-Syndromic Hearing Loss: A Case Report with a Novel TRIOBP Gene Variant
Published 2024-12-01Get full text
Article -
5235
-
5236
Isolation of Escherichia coli 0157:H7 Strain from Fecal Samples of Zoo Animal
Published 2013-01-01“…E. coli O157:H7 isolates were distinguished by agglutination with E. coli O157:H7 latex reagent (Oxoid), identified among the isolates, which showed that multiple E. coli strains were isolated from one petting zoo animal, in which a single animal simultaneously shed multiple E. coli strains; E. coli O157:H7 was isolated only by selective enrichment culture of 2 g of petting zoo animal feces. …”
Get full text
Article -
5237
Comparative study of pulpal response following direct pulp capping using synthesized fluorapatite and hydroxyapatite nanoparticles
Published 2025-01-01“…Blood samples were collected to examine some antioxidant enzymes nitric oxide (NO), superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GPx), glutathione (GSH), interleukin-6 (IL-6), and tumor necrosis factor-α (TNF-α). …”
Get full text
Article -
5238
Stabilization and Solidification of Produced Tailings in the Lead Extraction Process Using Brine Leaching Method
Published 2024-10-01“…The primary aim of this research is to diminish the solubility of metallic elements in BLT through the application of stabilization and solidification (S/S) techniques, incorporating additives such as cement, silica fume, and sand.Materials and Methods: While assessing the physical properties of BLT, their chemical characteristics, including heavy metal content, were analyzed using ICP-OES and oxide compositions were determined via XRF. To decrease the solubility of heavy metals, particularly lead, the S/S method was applied to these tailings. …”
Get full text
Article -
5239
Hydrogen and hydrogen sulphide in volcanic gases: abundance, processes, and atmospheric fluxes
Published 2023-09-01“…Lower temperature (${<}$1000 °C) volcanic gases exhibit more oxidizing redox conditions (typically above the Nickel–Nickel Oxide buffer) that are caused by a combination of (i) gas re-equilibration during closed-system (gas-phase only) adiabatic cooling in a gas-buffered system, and (ii) heterogenous (gas–mineral) reactions. …”
Get full text
Article -
5240
Promotion mechanism of hydroxyl groups in catalyzing CO2 cycloaddition
Published 2025-01-01“…., NEt3(HE)Br, NEt2(HE)2Br, NEt1(HE)3Br, and N(HE)4Br, were successfully prepared by quantitatively grafting hydrogen-bond donors (HBDs) as electrophilic sites on quaternary ammonium salts and then used to catalyze the cycloaddition of propylene oxide (PO) and carbon dioxide (CO2). The aim was to reveal the effects of different amounts of hydroxy-functionalized quaternary ammonium salts on their catalytic activities. …”
Get full text
Article