Showing 5,221 - 5,240 results of 8,883 for search 'Oxhide~', query time: 1.97s Refine Results
  1. 5221

    Steganography based on parameters’ disturbance of spatial image transform by Xi SUN, Wei-ming ZHANG, Neng-hai YU, Yao WEI

    Published 2017-10-01
    “…In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in real world.How to use image process to improve steganography has not been systematically studied.Taking spatial image transform for consideration,a parameters’ disturbance model was presented,which could hide the noise taken by steganography in the pixel fluctuation due to the disturbance.Meanwhile,it would introduce cover source mismatch for a steganalyzer.The experimental results show that,compared with using traditional image database,it can significantly enhance the security of steganography algorithms and accommodative to the real world situation.…”
    Get full text
    Article
  2. 5222

    Lightweight integrity verification scheme for cloud based group data by Yun-fei LIU, Yong-jun WANG, UShao-jing F

    Published 2016-10-01
    “…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
    Get full text
    Article
  3. 5223

    DGANS:robustness image steganography model based on double GAN by Leqing ZHU, Yu GUO, Lingqiang MO, Daxing ZHANG

    Published 2020-01-01
    “…Deep convolutional neural networks can be effectively applied to large-capacity image steganography,but the research on their robustness is rarely reported.The DGANS (double-GAN-based steganography) applies the deep learning framework in image steganography,which is optimized to resist small geometric distortions so as to improve the model’s robustness.DGANS is made up of two consecutive generative adversarial networks that can hide a grayscale image into another color or grayscale image of the same size and can restore it later.The generated stego-images are augmented and used to further train and strengthen the reveal network so as to make it adaptive to small geometric distortion of input images.Experimental results suggest that DGANS can not only realize high-capacity image steganography,but also can resist geometric attacks within certain range,which demonstrates better robustness than similar models.…”
    Get full text
    Article
  4. 5224

    Le dilemme du Parti républicain dans le Wisconsin suite à l’élection de Trump by Roman Vinadia

    Published 2018-09-01
    “…The results of the 2016 presidential election seem to indicate the Republican Party’s completion of its conquest of rural America. Yet, those results hide significant voting patterns that point to a dilemma the Party will have to address if it is to maintain electoral viability. …”
    Get full text
    Article
  5. 5225

    Prix des captifs, prix des esclaves : l’estimation du « prix de l’Homme » dans l’Antiquité tardive by Hervé Huntzinger

    Published 2014-12-01
    “…But, these laws only applied marginally and, as a result, could not hide that the estimated price of enslaved individuals and the price of freedom both had a symbolic aspect.…”
    Get full text
    Article
  6. 5226

    Rougissement littéraire by Ina Schenker

    Published 2024-12-01
    “…In the different stages of shame, from paralysis to the desire to hide or forget everything to aggression, the analysis opens up the necessary room for reflection towards action that can overcome shame in its actual injustice…”
    Get full text
    Article
  7. 5227

    New construction of secure range query on encrypted data in cloud computing by Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, Ru-chuan WANG

    Published 2015-02-01
    “…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
    Get full text
    Article
  8. 5228

    Proper Hand Washing for School Children by Amy Simonne

    Published 2006-03-01
    “… Germs can hide under long fingernails and on dirty hands. Keeping your fingernails short and washing your hands often, are the most important things you can do to stop germs from making you sick. …”
    Get full text
    Article
  9. 5229

    Visibilité des aménités, invisibilisation des inondations. L’inondation dans l’écoquartier à La Riche (agglomération de Tours) by Mathilde Gralepois

    Published 2023-12-01
    “…The eco-district labelling process helps to negotiate and hide the risk of flooding, by highlighting the environmental qualities of the area.…”
    Get full text
    Article
  10. 5230

    Watermarking algorithm for image authentication based on second generation Bandelet by LIU Xu-chong1, LUO Yong1, WANG Jian-xin1, WANG Jie1

    Published 2010-01-01
    “…A watermarking algorithm for image authentication was designed,which was based on second generation Bandelet translation and statistical model.The image directional flow was constructed by using Bandelet,and it could depict the characteristic of the image.By applying noise visibility function,the noise visibility intensity algorithm which was based on Gaussian statistical models was proposed.The blocks of image which contain more texture information were selected to hide the image directional flow,based on the noise visibility intensity algorithm.The image was authen-ticated through comparing the hiding information and the carrier image directional flow created by Bandelet.Experimen-tal results show that the algorithm can resist the JPEG compression and noise attack strongly and guarantee the quality of the sight.It is a blind detection algorithm,and this algorithm has high concealment performance and security.…”
    Get full text
    Article
  11. 5231

    Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security by Javier Blesa, Alvaro Araujo, Elena Romero, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. …”
    Get full text
    Article
  12. 5232

    Proper Hand Washing for School Children by Amy Simonne

    Published 2006-03-01
    “… Germs can hide under long fingernails and on dirty hands. Keeping your fingernails short and washing your hands often, are the most important things you can do to stop germs from making you sick. …”
    Get full text
    Article
  13. 5233

    Tracer l’animal dans les nouvelles de Rick Bass by Claire Cazajous-Augé

    Published 2017-02-01
    “…Through descriptions of animals that try to hide from man’s gaze, Rick Bass creates a scriptural and physical approach that not only allows the author to redefine the descriptive mode, but also renews the relations between man and the nonhuman world. …”
    Get full text
    Article
  14. 5234
  15. 5235
  16. 5236

    Isolation of Escherichia coli 0157:H7 Strain from Fecal Samples of Zoo Animal by Aseel Mohammed Hamzah, Aseel Mohammed Hussein, Jenan Mahmoud Khalef

    Published 2013-01-01
    “…E. coli O157:H7 isolates were distinguished by agglutination with E. coli O157:H7 latex reagent (Oxoid), identified among the isolates, which showed that multiple E. coli strains were isolated from one petting zoo animal, in which a single animal simultaneously shed multiple E. coli strains; E. coli O157:H7 was isolated only by selective enrichment culture of 2 g of petting zoo animal feces. …”
    Get full text
    Article
  17. 5237

    Comparative study of pulpal response following direct pulp capping using synthesized fluorapatite and hydroxyapatite nanoparticles by Eman M. Salem, Omnia M. Abdelfatah, Rania A. Hanafy, Rehab M. El-Sharkawy, Ghadir Elnawawy, Wafaa Yahia Alghonemy

    Published 2025-01-01
    “…Blood samples were collected to examine some antioxidant enzymes nitric oxide (NO), superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GPx), glutathione (GSH), interleukin-6 (IL-6), and tumor necrosis factor-α (TNF-α). …”
    Get full text
    Article
  18. 5238

    Stabilization and Solidification of Produced Tailings in the Lead Extraction Process Using Brine Leaching Method by Ravanbakhsh Shirdam, Atefeh Nezami

    Published 2024-10-01
    “…The primary aim of this research is to diminish the solubility of metallic elements in BLT through the application of stabilization and solidification (S/S) techniques, incorporating additives such as cement, silica fume, and sand.Materials and Methods: While assessing the physical properties of BLT, their chemical characteristics, including heavy metal content, were analyzed using ICP-OES and oxide compositions were determined via XRF. To decrease the solubility of heavy metals, particularly lead, the S/S method was applied to these tailings. …”
    Get full text
    Article
  19. 5239

    Hydrogen and hydrogen sulphide in volcanic gases: abundance, processes, and atmospheric fluxes by Aiuppa, Alessandro, Moussallam, Yves

    Published 2023-09-01
    “…Lower temperature (${<}$1000 °C) volcanic gases exhibit more oxidizing redox conditions (typically above the Nickel–Nickel Oxide buffer) that are caused by a combination of (i) gas re-equilibration during closed-system (gas-phase only) adiabatic cooling in a gas-buffered system, and (ii) heterogenous (gas–mineral) reactions. …”
    Get full text
    Article
  20. 5240

    Promotion mechanism of hydroxyl groups in catalyzing CO2 cycloaddition by Yiming Wang, Wensheng Wei, Yuxin Wang, Guangwen Xu, Jinggang Zhao, Lei Shi

    Published 2025-01-01
    “…., NEt3(HE)Br, NEt2(HE)2Br, NEt1(HE)3Br, and N(HE)4Br, were successfully prepared by quantitatively grafting hydrogen-bond donors (HBDs) as electrophilic sites on quaternary ammonium salts and then used to catalyze the cycloaddition of propylene oxide (PO) and carbon dioxide (CO2). The aim was to reveal the effects of different amounts of hydroxy-functionalized quaternary ammonium salts on their catalytic activities. …”
    Get full text
    Article