Data hiding based on noise-like signal addressing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Hiding System Based on New Multiple Echo Hiding Method

With the development of information society, audio steganalysis has attracted more attentions recently. Echo hiding method is one of the most challenging research fields. However, most of them can't solve the contradiction of capacity, robustness and imperceptibility, which restrict the development of the system seriously. Some of them have low capacity, and others have relatively high capacity...

متن کامل

High Rate Data Hiding in Speech Signal

One of the main issues with data hiding algorithms is capacity of data embedding. Most of data hiding methods suffer from low capacity that could make them inappropriate in certain hiding applications. This paper presents a high capacity data hiding method that uses encryption and the multi-band speech synthesis paradigm. In this method, an encrypted covert message is embedded in the unvoiced b...

متن کامل

Data Hiding in Audio Signal: A Review

Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like audio. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. In this paper we will attend the general principles of hiding...

متن کامل

Data Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

متن کامل

Addressing Malicious Noise in Clickthrough Data

Clickthrough logs are becoming an increasingly used source of training data for learning ranking functions. Due to the large impact that the position in search results has on commercial websites, malicious noise is bound to appear in search engine click logs. We present preliminary work in addressing this form of noise, that we term click-spam. We analyze click-spam from a utility standpoint, a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Radiotekhnika

سال: 2020

ISSN: 0485-8972

DOI: 10.30837/rt.2020.4.203.04