نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

2006
Hirofumi Tsumura

where t is a complex variable. By Assumption I, we see that the series (1.3) is convergent when <t < 0. We further assume the following: (Assumption II ) ψ(s) can be continued analytically to the whole complex plane C, and holomorphic for all s ∈ C. In any fixed strip σ1 ≤ σ ≤ σ2, ψ(s; u) is uniformly convergent to ψ(s) as u → 1 + 0. Furthermore there exists a certain θ0 = θ0(σ1, σ2) ∈ R with 0...

2000
Jean-Marie Dufour Lynda Khalaf Maral Kichian

In this paper, we use identification-robust methods to assess the empirical adequacy of a New Keynesian Phillips Curve (NKPC) equation. We focus on the Gali and Gertler’s (1999) specification, on both U.S. and Canadian data. Two variants of the model are studied: one based on a rationalexpectations assumption, and a modification to the latter which consists in using survey data on inflation exp...

Journal: :European Journal of Operational Research 2012
Peter Grundke Simone Polle

The knowledge of the multivariate stochastic dependence between the returns of asset classes is of importance for many finance applications, such as, e.g., asset allocation or risk management. By means of goodness-of-fit tests, it is analyzed for a multitude of portfolios consisting of different asset classes whether the stochastic dependence between the portfolios’ constituents can be adequate...

2013
Hazem Al-Najjar Nadia Al-Rousan

In this paper, new information security algorithms using a Rossler chaotic function are suggested, which contain image encryption, data encryption and data hiding. In designing the image encryption algorithm, a chaotic block was used to change the pixels value using the target pixels in each block. The experiments show that the system performance is improved and the cipher image characteristics...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2022

Steganography is the art and science where writing messages are hidden in such a way that no user at end side knows exactly what message delivered. Data hiding characteristic related to object-oriented programming objects associated with data having predefined template. Thus, all not required by an object can be said "hidden". The word "Steganography" of Greek origin means "covered, or writing"...

2017
Namrata Singh Virendra Kumar Yadav

Steganography is the science of hiding data by embedding it in cover files without altering it. The cover media may be text, image, voice or video streams in a digitized format. Steganography is used to prevent unauthorized users from becoming aware of the very existence of a message, let alone what it contains. These new techniques makes hidden message indistinguishable from the white noise. E...

Journal: :CoRR 2013
Arijit Kumar Pal Poulami Das Nilanjan Dey

----Digital watermarking is a technique of information adding or information hiding in order to identify the owner of the data in multimedia content. It seems that a signal or digital image can permanently embed over another digital data providing a good way to protect intellectual property from illegal replication. The cover data that is transmitted through the internet hides the watermark in ...

2014
B.Prabhakaran A.Murugan

Nowadays, Internet and digital media are getting more popular. So, the need and requirement for secure transmission of data also increasing rapidly.A given input video file is converted into frame sequences and one of frame will be selected to conceal the secret data for secured data communication. The proposed technique uses chaos crypto system for encrypting a secret text data into cipher tex...

2012
S. Mohanapriya

Design and Implementation of Steganography along with secured message services in Mobile Phones is used to provide security to the data that flows across the mobiles. Two people may communicate securely by encrypting the message sent between them. Now a day, several methods are used for communicating secret messages for defense purpose or in order to ensure the privacy of communication between ...

2006
Mauro costantini Joakim Westerlund

Most econometric methods for testing the proposition of long-run monetary neutrality rely on the assumption that money and real output do not cointegrate. This paper argues that these results can be attributed in part to the low power of univariate tests, and that a violation of the noncointegration assumption is likely to result in a nonrejection of the neutrality proposition. To alleviate thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید