نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

Journal: :Computer Science Review 2021

In order to provide a coherent overview of cyber security research, the Scopus academic abstract and citation database was mined create graph 98,373 authors active in field between 1949 early 2020. The Louvain community detection algorithm applied identify existing research communities. analysis discovered twelve top-level communities: access control, authentication, biometrics, cryptography (I...

2010
R. Amirtharajan Bosco Balaguru W. Bender D. Gruhl N. Morimoto A. Lu Po-Yueh Chen Hung-Ju Lin Tariq S. Durrani K. Thenmozhi Ramjee Prasad Feng-Wen Sun

Information is considered as the most valuable resource in today's data-centric world. In recent times there has been a prodigious growth in information transmission. Parallel to it the data hiding techniques have also developed to sustain information authentication and confidentiality. Traditionally data was hidden in covers such as text, images and audio. But, all these enclosed the data befo...

2013
Mansour Sheikhan Kazem Asadollahi Reza Shahnazi

Steganography is a method for hiding information in a host signal. The host signal can be a still image, speech or video and the message signal that is hidden in the host signal can be a text, image or an audio signal. In this paper, a steganography method is proposed in which information hiding in the least significant bits (LSBs) of wavelet coefficients and also direct message replacement in ...

2017

The data in digital images can be manipulated to some extend without being detected by human eyes. An example of such manipulations is insertion of secret information which is often referred to as information hiding. In this research we embedded the secret text data in spatial domain of a given 8 bit gray scale image followed by image compression using IWT on hardware Spartan III(XC3S200TQ144-4...

2016
M. Mary Shanthi Rani

The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response)...

2012
Obaida Mohammad Awad Al-Hazaimeh

Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown...

2013
Prince Kumar Panjabi Parvinder Singh Souvik Bhattacharyya Chung-Ming Wang

Data Hiding is one of the challenging issues in the field of Network Security. Unlike cryptography, Steganography is used to hide the existence of secret message by embedding the message behind any cover object like image, text, audio, video files. Various authors proposed, various methods for hiding secret information behind gray scale images such as least significant method, gray level modifi...

2017
A. N. Senarathne Kasun De Zoysa

Data transmission is frequently face intrusions issues. Different data hiding methods are there to address this problem. Steganography being one; intends on writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Moreover, cryptography is a tool used in protecting information using cipher text. However, these method...

2014
Princy Raj

Recently more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original image cover can be losslessly recovered after data embedded is extracted while protecting the image content’s as confidential. In this survey paper different reversible data hiding methods are analyzed. All previous methods embed data by reversibly vac...

2005
Osamu Takizawa Kyoko Makino Tsutomu Matsumoto Hiroshi Nakagawa Ichiro Murase

Information hiding technology embeds information using the redundancy of information contained in cover data. Therefore, many informationhiding techniques for cover data with a lot of redundancy, such as images or sound signals, have been proposed. Most proposed information hiding techniques that set document to cover data tampered with layouts between spacing and words. In this paper, a new in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید