نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

2016
Tsvetomila Mihaylova Georgi Karadjov Yasen Kiprov Georgi Georgiev Ivan Koychev Preslav Nakov

The anonymity of a text’s writer is an important topic for some domains, such as witness protection and anonymity programs. Stylometry can be used to reveal the true author of a text even if s/he wishes to hide his/her identity. In this paper, we present our approach for hiding an author’s identity by masking their style, which we developed for the Author Obfuscation task, part of the PAN-2016 ...

2008
Zhili Chen Liusheng Huang Zhenshan Yu Wei Yang Lingjun Li Xueling Zheng Xinxin Zhao

Linguistic steganography is a branch of Information Hiding (IH) using written natural language to conceal secret messages. It plays an important role in Information Security (IS) area. Previous work on linguistic steganography was mainly focused on steganography and there were few researches on attacks against it. In this paper, a novel statistical algorithm for linguistic steganography detecti...

2012
Prem Singh Rajat Chaudhary Ambika Agarwal

Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Digital Steganography algorithms have been developed by using texts, images and audio etc as the cover media. In this approach, a security model is proposed which imposes the concept of secrecy over privacy for text mess...

2015
Nitin Kaul Mrinal Chandra Jessica Fridrich Miroslav Goljan Dorin Hogea R. J. Qureshi Hedieh Sajedi Mansour Jamzad

In a very less time internet has got heights. In every organization internet is the main employee without which the organization will doom. Most of the work is done, saved, edited online. With this such well-developed backbone, one important issue arises, and that is cybercrime. If communication is done online, that means data is being transferred, and security of that data is important. For th...

Journal: :Problemi ìnformatizacìï ta upravlìnnâ 2022

In the article, an efficient method of hiding secret information in text-type containers based on changing inter-symbol intervals is suggested. Here, process performed by selecting symbols container a pseudo-random sequence to increase reliability. To obtain linear congruent and Feigenbaum's quadratic function were used.

Journal: :I. J. Network Security 2017
Jianjun Zhang Huajun Huang Lucai Wang HaiJun Lin Deng Gao

The attackers may discover the existence of the secret information or even get it by analyzing the cover’s statistical characteristics, changes of which often occur due to the embedding. In this paper, a novel coverless text information hiding method was proposed. By using the words rank map and the frequent words hash, normal texts containing the secret information could be retrieved from the ...

2014
THANDAR LWIN

Today, internet is widely used to transfer various secret data in all over the world. During transmission secret data, unauthorized viewers can monitor it. Steganography is mainly used to protect secret data from unauthorized viewers over communication channel. Steganography means the covered or hidden writing. There exits many steganography model such as image, audio, video or text. Among them...

2016
Jaspreet Kaur Jagroop kaur Jagroop Kaur

This paper presents the hiding of text in video using haar wavelet transform in particular frame and BCH codes. Haar wavelet transform is applied to get the low frequency sub-band in an image to hide data. The frequency sub-bands are (LL, LH, HL and HH). BCH codes are used to encrypt the data. The work of various researchers is discussed about video steganography and their techniques for embedd...

Journal: :JCS 2017
Atef A. Obeidat

Email: [email protected], [email protected] Abstract: Steganography is a technique for hiding data in media in a way that makes its existence hard to detect. Text files are a preferable format for use in steganography due to the small storage size of such files. This paper presents an Arabic text steganographic algorithm based on Unicode. The algorithm imposes a minimal change on connected le...

2006
Aravind K. Mikkilineni Pei-Ju Chiang George T.-C. Chiu Jan P. Allebach Edward J. Delp

In previous publications we have demonstrated the use of laser intensity modulation to embed information in halftone and text documents. In those experiments we were able to embed and correctly decode 33 bits in a 12 point page of printed text. In this paper we will present our current work on developing a channel model for a text document. This model will allow us to define capacity bounds for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید