Information Hiding Techniques Using Network Protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Hiding by Using Multiple Techniques of Audio Steganography

Today, communication is main part of everybody’s life. Security is the most important issue in any communication. So we need a secured system to exchange data securely between users. For this purpose of security there are various techniques like cryptography, watermarking and steganography. Steganography is used to transmit information in covered form. In steganography we hide the presence of d...

متن کامل

Study of Techniques on Information Hiding Using QR Barcode

Nowadays, the information processing system plays crucial part in the internet’s. Online information security has become the top priority in all different sectors. Failing to provide online information security may cause loss of critical information or someone may use or distribute such information for malicious for various purpose. Recently QR barcodes have been used as an effective way to sec...

متن کامل

Efficient Techniques for Multimedia Information Hiding using Color Visual Cryptography

In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security and to increase the payload. Both are important parameters in information hiding. The proposed techniques provide three levels of security without reducing the payload and the image qua...

متن کامل

Damageless Information Hiding using Neural Network on YCbCr Domain

In this paper, we propose a new information hiding technique without embedding any information into the target content by using neural network trained on frequency domain especially on YCbCr domain. Proposed method can detect a hidden bit codes from the content by processing the selected feature subblocks into the trained neural network. Hidden codes are retrieved from the neural network only w...

متن کامل

A Survey of Information Hiding Techniques

To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: AL-Rafidain Journal of Computer Sciences and Mathematics

سال: 2011

ISSN: 2311-7990

DOI: 10.33899/csmj.2011.163650