Image Steganography and Global Terrorism

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

Image Steganography

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...

متن کامل

Image steganography and steganalysis

Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today’s digital world where information is often and easily exchanged through...

متن کامل

Terrorism- A Global Challenge

[The definition of Terrorism] Lately, a lot of military actions are claimed as acts of terrorism, as a result of the lack of a universal definition of terrorism. States and military organizations name each other terrorists, since states and military organizations have particular interests such as religious, economical and political power. There are two different ways of thinking, one believe th...

متن کامل

Image Steganography: Concepts and Practice

In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following tutorial we go over some general concepts and ideas that apply to steganography and steganalysis. We review and discuss the notions of steganographic security and capacity. Some of the more recent image steganography and steganalysis techniques are ana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2012

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-0123448