Information Hiding Algorithm with Strong Security Based on Run Length
نویسندگان
چکیده
منابع مشابه
Security and Information Hiding based on DNA Steganography
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. As a special cryptography, DNA steganography is safer than ordinal cryptography, only if the primer sequences are concealed from an adversary however this is not easy . DNA cryptography and steganography differs from the conventional cryptology in the terms that the keys and the cipher texts are al...
متن کاملA Text Information Hiding Algorithm Based on Alternatives
In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...
متن کاملA Text Information Hiding Algorithm Based on Alternatives
In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...
متن کاملA chaos-based approach for information hiding security
This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory. In this paper, a scheme is considered as secure if its behavior is proven unpredictable. The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one. This new definition o...
متن کاملAn Improved Information Hiding Algorithm
Hiding technology is a newly developed discipline that concludes many subjects and covers many fields, and it hides the transferring information in the carrier, which greatly increases the safety of information transmission. In order to hide and transfer information more effectively, the paper researched the cloud algorithm in the model of information hiding. It also studied the model of inform...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2014
ISSN: 1812-5638
DOI: 10.3923/itj.2014.895.903