نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

2014
Amrita A. Manjrekar

Since the rise of the Internet, security of information is one of the most important factors of information technology. This paper represents a new approach for data hiding by combining art image creation and tree based parity check method. First, a cubism-like art image which is an abstraction by prominent lines and regions is generated using source image. Then text message is embedded using t...

1995
Scott E. Maxwell David A. Cole

One reason many methodological articles are not very intelligible to their readers is because the content is often inherently difficult. However, a contributing factor in some cases is the tacit assumption that rules of good writing cease to apply when writing about statistics. The authors of this article argue that good writing becomes even more important as the content of the article becomes ...

2010
Hebah H.O. Nasereddin

The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements t...

2014
Anjali Tiwari Seema Rani Yadav

The image steganography is known as a technique of hiding information in cover object such that the analysis of stego image doesn’t provides any clue of hidden data. The image steganography is not a new concept but the recent growth in the computer networks makes it live again because of large visual data sharing in computer networks and greater embedding capability than text and with a large n...

2007
Marwan Sabbouh

This paper harmonizes semantic web services and mashups by leveraging semantics in Schemas, and by generating aligned ontologies from mappings between schemas. Hence, we propose to encode the import of schemas and their mappings in HTML, which when combined with JavaScript libraries enable a web user to write mashups while hiding coding complexities and promoting reuse of schemas. These Web pag...

2012
D. Prabhakar Gopala Krishna

This paper demonstrates an effective lossless data hiding scheme using min imum Redundancy codes. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. The proposed scheme not only provides good data hiding capacity and data recovery capability, but also being efficient in space saving. Each symbol in a cover...

Journal: :Information Security Journal: A Global Perspective 2012
P. Mohan Kumar K. L. Shunmuganathan

Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper concentrates on integrating Tri way pixel ...

2013
C. V. Rambabu B. Swarnalatha

Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like image, audio, video. image Steganography is a technique used to transmit hidden information by modifying an image signal in to imperceptible manner. In this proposed method, secret message in form of image or text is embedded within anoth...

2011
P. Mohan Kumar K. L. Shunmuganathan

Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper introduces a new approach which is based u...

2014
Ivan Stojanov Aleksandra Mileva Igor Stojanović

Electronic documents, similarly as printed documents, need to be secured by adding some specific features that allow efficient copyright protection, authentication, document tracking or investigation of counterfeiting and forgeries. Microsoft Word is one of the most popular word processors, and several methods exist for embedding data specially in documents produced by it. We present a new type...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید