نتایج جستجو برای: steganography
تعداد نتایج: 3630 فیلتر نتایج به سال:
Video Steganography is a new research area which is playing an important role in information hiding criteria. Nowadays security of confidential information is major issue over the internet. To protect the secret information from cyber criminals like attackers, hackers and data thefts, a secure and standardized methodology is used that is known as steganography. It is beneficial for society to s...
Steganography and steganalysis are the prominent research fields in information hiding paradigm. Steganography is the science of invisible communication while steganalysis is the detection of steganography. Steganography means “covered writing” that hides the existence of the message itself. Digital steganography provides potential for private and secure communication that has become the necess...
Steganography is used to hide a secret message within a cover image, thereby yielding a stego image such that even the trace of the presence of secret information is wiped out. The purpose of steganography is to maintain secret communication between two users. Steganography has several technical challenges namely high hiding capacity and imperceptibility. Steganographic technique with Integer W...
Steganography is the discipline that deals with concealing the existence of secret communications. Existing research already provided several fundamentals for defining steganography and presented a multitude of hiding methods and countermeasures for this research discipline. Contribution. We identified that no work exists that discusses the process of applying steganography from an individual’s...
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the fe...
---In this paper propose a new method for the real-time hiding of information used in compressed video bitstreams. This method is based on the real-time hiding of information in audio steganography. This method of steganography is very similar to the two discussions of image steganography and video steganography. A new compressed video secure steganography(CVSS) algorithm is proposed. In this a...
in this paper, we proposed a data-hiding scheme based on run length matrix. in a previously proposed method, a technique based on texture classification was introduced where four statically features extracted from run length matrix; then best cover images are selected based on these features. using appropriate features for comparing images from undetectability viewpoint, guarantees, less detect...
| Introduction | Null Ciphers | Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio
As cryptography is the standard way of ensuring privacy, integrity and confidentiality of a public channel, steganography steps in to provide even stronger assumptions. Thus, in the case of cryptology, an attacker cannot obtain information about the payload while inspecting its encrypted content. In the case of steganography, one cannot prove the existence of the covert communication itself. Th...
Steganography is hiding the secret data into a cover object to protect it from unauthorized access. It is a technique of invisible communication which hides the existence of the message. If the cover object used is an image, the steganography is known as image steganography. It has many applications like Online transactions, military communication etc. In this paper we are discussing Existing i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید