Information Hiding Techniques Using Network Protocols
نویسندگان
چکیده
منابع مشابه
Information Hiding by Using Multiple Techniques of Audio Steganography
Today, communication is main part of everybody’s life. Security is the most important issue in any communication. So we need a secured system to exchange data securely between users. For this purpose of security there are various techniques like cryptography, watermarking and steganography. Steganography is used to transmit information in covered form. In steganography we hide the presence of d...
متن کاملStudy of Techniques on Information Hiding Using QR Barcode
Nowadays, the information processing system plays crucial part in the internet’s. Online information security has become the top priority in all different sectors. Failing to provide online information security may cause loss of critical information or someone may use or distribute such information for malicious for various purpose. Recently QR barcodes have been used as an effective way to sec...
متن کاملEfficient Techniques for Multimedia Information Hiding using Color Visual Cryptography
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security and to increase the payload. Both are important parameters in information hiding. The proposed techniques provide three levels of security without reducing the payload and the image qua...
متن کاملDamageless Information Hiding using Neural Network on YCbCr Domain
In this paper, we propose a new information hiding technique without embedding any information into the target content by using neural network trained on frequency domain especially on YCbCr domain. Proposed method can detect a hidden bit codes from the content by processing the selected feature subblocks into the trained neural network. Hidden codes are retrieved from the neural network only w...
متن کاملA Survey of Information Hiding Techniques
To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: AL-Rafidain Journal of Computer Sciences and Mathematics
سال: 2011
ISSN: 2311-7990
DOI: 10.33899/csmj.2011.163650