Hiding in Text using Information Integrity Service

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coverless Text Information Hiding Method Using the Frequent Words Hash

The attackers may discover the existence of the secret information or even get it by analyzing the cover’s statistical characteristics, changes of which often occur due to the embedding. In this paper, a novel coverless text information hiding method was proposed. By using the words rank map and the frequent words hash, normal texts containing the secret information could be retrieved from the ...

متن کامل

Information Hiding System using Text and Image Steganography

Today, internet is widely used to transfer various secret data in all over the world. During transmission secret data, unauthorized viewers can monitor it. Steganography is mainly used to protect secret data from unauthorized viewers over communication channel. Steganography means the covered or hidden writing. There exits many steganography model such as image, audio, video or text. Among them...

متن کامل

Information Hiding for Text by Paraphrasing

Digital fingerprinting becomes paid growing attention as a technology resolving copyright problems. Previously, researchers have been only interested in image based digital fingerprinting where secret information is hidden in images, and text have not been the main target of hiding information. In this paper, we propose an information hiding method for text. Our information hiding method is bas...

متن کامل

Cloud-Aware Web Service Security: Information Hiding in Cloud Computing

This study concerns the security challenges that the people face in the usage and implementation of cloud computing. Despite its growth in the past few decades, this platform has experienced different challenges. They all arise from the concern of data safety that the nature of sharing in the cloud presents. This paper looks to identify the benefits of using a cloud computing platform and the i...

متن کامل

Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: AL-Rafidain Journal of Computer Sciences and Mathematics

سال: 2009

ISSN: 2311-7990

DOI: 10.33899/csmj.2009.163789