Hiding Techniques for Dynamic Encryption Text based on Corner Point

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hiding in the corner.

We describe a novel type of electromagnetic cloak designed to conceal an object in a corner, and demonstrate its excellent performance by employing direct numerical simulation. Furthermore, we study the angular dependence and the effect of loss on the invisibility performance and compare ideal and simplified cloaks. The proposed structure has homogeneous constitutive parameters, which greatly s...

متن کامل

Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-rand...

متن کامل

Text Image with Complex Background Filtering Method Based on Harris Corner-point Detection

In order to solve the problem of text image containing the complex background in which the text of image cannot be read clearly and intuitively, this paper proposed a filtering method based on the Harris cornerpoint detection. The experimental results show that the algorithm can filter the background which contains text image commendably, making it possible for visually reading.

متن کامل

Cryptography and Image Steganography Using Dynamic Encryption on LSB and Color Image Based Data Hiding

Cryptography and steganography are two conventional techniques used to cipher or hide information or data in existing communication. Cryptography is the art of saving information by encrypting it into an obscure format. On the other hand, steganography is the art and science of secret communication to send messages in a way which hides even the existence of the communication. In cryptography me...

متن کامل

Data Hiding Capacity and Embedding Techniques for Printed Text Documents

In previous publications we have demonstrated the use of laser intensity modulation to embed information in halftone and text documents. In those experiments we were able to embed and correctly decode 33 bits in a 12 point page of printed text. In this paper we will present our current work on developing a channel model for a text document. This model will allow us to define capacity bounds for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2018

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/1003/1/012027