Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
نویسندگان
چکیده
منابع مشابه
High capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کاملQuadratic Surface Embedding
We discuss various primal and dual algorithms for multidimensional scaling with spherical, ellipsoidal, and more general quadratic constraints. Distances between points on the surface can be either measured along Euclidean lines or along shortest geodesics on the surface.
متن کاملA Novel Data Embedding Technique for Hiding Text in Video File using Steganography
Today’s internet applications require data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography. That has to do with secure data transmission between a sender and a receiver; implementing Steganography is the best way. Steganography...
متن کاملEnsuring Message Embedding in Wet Paper Steganography
Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded decoding. In 2005, Fridrich et al. introduced wet paper codes to improve the undetectability of the embedding by enabling the sender to lock some components of the cover-data, according to the nature of the cover-medium and the message. Unfortunately, almo...
متن کاملSingle-Mismatch 2LSB embedding method of steganography
This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image’s pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2017
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v7i2.pp799-809