Data hiding based on noise-like signal addressing
نویسندگان
چکیده
منابع مشابه
Data Hiding System Based on New Multiple Echo Hiding Method
With the development of information society, audio steganalysis has attracted more attentions recently. Echo hiding method is one of the most challenging research fields. However, most of them can't solve the contradiction of capacity, robustness and imperceptibility, which restrict the development of the system seriously. Some of them have low capacity, and others have relatively high capacity...
متن کاملHigh Rate Data Hiding in Speech Signal
One of the main issues with data hiding algorithms is capacity of data embedding. Most of data hiding methods suffer from low capacity that could make them inappropriate in certain hiding applications. This paper presents a high capacity data hiding method that uses encryption and the multi-band speech synthesis paradigm. In this method, an encrypted covert message is embedded in the unvoiced b...
متن کاملData Hiding in Audio Signal: A Review
Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like audio. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. In this paper we will attend the general principles of hiding...
متن کاملData Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image
An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...
متن کاملAddressing Malicious Noise in Clickthrough Data
Clickthrough logs are becoming an increasingly used source of training data for learning ranking functions. Due to the large impact that the position in search results has on commercial websites, malicious noise is bound to appear in search engine click logs. We present preliminary work in addressing this form of noise, that we term click-spam. We analyze click-spam from a utility standpoint, a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Radiotekhnika
سال: 2020
ISSN: 0485-8972
DOI: 10.30837/rt.2020.4.203.04