نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

2013
Suresh Gawande

In this paper we review different Steganography techniques for hiding the data. Steganography is a technique of hiding the data in any media in such a way that it remains confidential. This paper explores the different method of data hiding: image steganography, audio steganography, video steganography, text steganography, steganography in spatial domain, transform domain and adaptive steganogr...

2012
Jun Sang Shenggui Ling Mohammad S. Alam

In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-rand...

Journal: :IEICE Transactions on Information and Systems 2019

2007
Renato Villán Sviatoslav Voloshynovskiy Oleksiy J. Koval Frédéric Deguillaume Thierry Pun

In this paper, we deal with the problem of authentication and tamper-proofing of text documents that can be distributed in electronic or printed forms. We advocate the combination of robust text hashing and text datahiding technologies as an efficient solution to this problem. First, we consider the problem of text data-hiding in the scope of the Gel’fand-Pinsker data-hiding framework. For illu...

2012
Rajinder kaur Gurwinder kaur

Proposed paper work concentrates on the secure transmission of text data when digital contents are commonly distributed by Internet and more security attacks are appeared from eavesdropping, data exposure and data tampering. In this paper we concentrate on hiding some secret text into a real time speech signal considering PSNR (Peak-Signal-to-Noise Ratio) and duration of speech signal as key pa...

Journal: :J. Inf. Sci. Eng. 2008
Shih-Tung Wu Kuo-Liang Chung Yong-Huai Huang Jung-Gen Wu

Recently, several algorithms have been developed to hide data in either text images or halftone images. According to an observation that the number of transitions between black pixel and white pixel in the halftone image is much larger than that in the text image, this paper presents a unified min-max transition (MMT) scheme to embed data into the above two types of images without visual degrad...

Journal: :IACR Cryptology ePrint Archive 2008
Abhishek Parakh Subhash C. Kak

This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter, thereby increasing the efficiency of secret sharing. We present applications of our proposed protocol to images as well as text.

2011
R. Venkateswaran

This paper shows the possibility of exploiting the features of Ecipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decryptin...

2012
Mritha Ramalingam

Computer technology and the Internet have made a breakthrough in the existence of data communication. This has opened a whole new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding the message in the carrier file enables the deniability of the existence of any message at all. This paper designs a stego machine to dev...

Journal: :Periodicals of Engineering and Natural Sciences (PEN) 2022

The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold method. becomes an efficient method to ensure secure transmission. Some visual cryptography techniques don’t guarantee security transmission because the secret information can be retrieved if hackers obtain number of shares. This study present with hiding based on YCbCr color space. proposed text file or image ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید