منابع مشابه
Digital Image Data Hiding Using Side Information
Robustness is a key issue for many prospective applications of data hiding technologies. The proposal to take into account side information at the encoder has meant a noteworthy advance in the quest for better data hiding methods. Still, the true impact of the advantages theoretically derived from this groundbreaking idea has not been sufficiently founded in practice. Departing from this situat...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملData Hiding in Windows Executable Files
A common technique for hiding information in executable files is the embedding a limited amount of information in program binaries. The hiding technique is commonly achieved by using special software tools as e.g. the tools presented by Hydan and Stilo in (Rakan, 2004, Bertrand, 2005). These tools can be used to commit crimes as e.g. industrial spy activities or other forms of illegal data acce...
متن کاملPerformance Analysis of Hiding Techniques in Digital Image Watermarking
Piracy is a big threat to the original contents. This multi-model approach interleaves some frequency domain watermarking strategies to counteract shortcomings of one strategy by the advantages of other. The original image is divided into spatially disjoint blocks. Watermarking is a way of embedding a mark that hides information in a multimedia carrier. Major issues in Image watermarking are to...
متن کاملReversible Dual-Image-Based Hiding Scheme Using Block Folding Technique
The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: AL-Rafidain Journal of Computer Sciences and Mathematics
سال: 2011
ISSN: 2311-7990
DOI: 10.33899/csmj.2011.163629