نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

Journal: :International Journal of Engineering Research and Advanced Technology 2020

2016
Tatwadarshi P. Nagarhalli J. W. Bakal Neha Jain

Steganography is an art of hiding secret message in an unsuspecting cover document. Over the many years many systems have been proposed for the same. With the advancement of technical know-how even the cover medium has under gone certain changes. Generally the cover mediums used include text, image, audio and video. Text steganography is one of the oldest techniques of steganography which still...

Journal: :Int. Arab J. Inf. Technol. 2010
Nasser Hamad

The paper is concerned with hiding information into a digital image, specifically, an English text is used to be hidden into a digital grey-scale image. The purpose of this research is to embed a maximum text data size into the most suitable image selected among several images based on the binary entropy function measurements of both the text and image. The embedding process is constrained by m...

2015
P. Selvigrija

Steganography is a type of secrete communication that hides the secrete information. It deals with the different ways of hiding/embedding the secrete information such as text, image, audio or video files inside another multimedia files with the help of private key. The hidden information is termed as secrete file and the file in which the secrete file is hidden is termed as cover file. The file...

2009
Chun-Xia Li

The issue of security becomes more and more important in the process of information transmission. The paper proposes a novel transmission scheme for text information by hiding it into a carrier image. Firstly, we use ASCII codes to represent the text information and encode these information codes by BCH code before transmitting them. Secondly, we divide the carrier image into 8×8 blocks and tra...

2014
V. P. Kavitha K. Suganya D. Suganya

This paper presents enhancement of data protection system for secret communication through common network based on reversible data concealment in encrypted images with reserve room approach. In this paper was implemented for true color RGB image and reserve room approach under multi scale decomposition. The Blue plane will be chosen for hiding the secret text data. Then image is then separated ...

Journal: :JSW 2013
Gongshen Liu Xiaoyun Ding Bo Su Kui Meng

In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...

2006
Renato Villán Sviatoslav Voloshynovskiy Oleksiy J. Koval José-Emilio Vila-Forcén Emre Topak Frédéric Deguillaume Yuriy B. Rytsar Thierry Pun

In this paper, we propose a new theoretical framework for the data-hiding problem of digital and printed text documents. We explain how this problem can be seen as an instance of the well-known Gel’fand-Pinsker problem. The main idea for this interpretation is to consider a text character as a data structure consisting of multiple quantifiable features such as shape, position, orientation, size...

2015
Liu Gongshen

In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...

2011
Anjan Pal Snehasish Banerjee

The pivotal purpose of this paper is to introduce a scheme for watermarking of digital images in which one can embed some secret text in an encrypted manner and a secret image more than once in the host image, starting from different pixel positions based on the key. All this can be done without violating any of the desirable properties of the standard watermarking algorithms. The key plays a p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید