Crypto Steganography using linear algebraic equation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Crypto-Steganography: A Survey

The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the fe...

متن کامل

Algebraic Equivalence of Linear Structural Equation Models

Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress ...

متن کامل

Chapter 3 System of linear algebraic equation

Topics from linear algebra form the core of numerical analysis. Almost every conceivable problem, be it curve fitting, optimization, simulation of flow sheets or simulation of distributed parameter systems requiring solution of differential equations, require at some stage the solution of a system (often a large system!) of algebraic equations. MATLAB (acronym for MATrix LABoratory) was in fact...

متن کامل

Medical Image Protection using steganography by crypto-image as cover image

This paper presents securing the transmission of medical images. The presented algorithms will be applied to images. This work presents a new method that combines image cryptography, data hiding and Steganography technique for denoised and safe image transmission purpose. In This method we encrypt the original image with two shares mechanism encryption algorithm then embed the encrypted image w...

متن کامل

Algebraic Equivalence Class Selection for Linear Structural Equation Models

Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer and Communication Technology

سال: 2014

ISSN: 2231-0371,0975-7449

DOI: 10.47893/ijcct.2014.1211