Crypto Steganography using linear algebraic equation
نویسندگان
چکیده
منابع مشابه
A Crypto-Steganography: A Survey
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the fe...
متن کاملAlgebraic Equivalence of Linear Structural Equation Models
Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress ...
متن کاملChapter 3 System of linear algebraic equation
Topics from linear algebra form the core of numerical analysis. Almost every conceivable problem, be it curve fitting, optimization, simulation of flow sheets or simulation of distributed parameter systems requiring solution of differential equations, require at some stage the solution of a system (often a large system!) of algebraic equations. MATLAB (acronym for MATrix LABoratory) was in fact...
متن کاملMedical Image Protection using steganography by crypto-image as cover image
This paper presents securing the transmission of medical images. The presented algorithms will be applied to images. This work presents a new method that combines image cryptography, data hiding and Steganography technique for denoised and safe image transmission purpose. In This method we encrypt the original image with two shares mechanism encryption algorithm then embed the encrypted image w...
متن کاملAlgebraic Equivalence Class Selection for Linear Structural Equation Models
Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Technology
سال: 2014
ISSN: 2231-0371,0975-7449
DOI: 10.47893/ijcct.2014.1211