منابع مشابه
A Hybrid Techniques for Executable File Hiding in Encrypted Image
Data hiding is referred as a process of hiding a data into a cover medium. Also the process works with two links one is with a set of embedding of additional data and another one is with a set of the cover data. The relationship between these two sets of data is characterized for different applications. For instance, in some communications, the hidden data may often be irrelevant to the cover m...
متن کاملPerformance Analysis of Hiding Techniques in Digital Image Watermarking
Piracy is a big threat to the original contents. This multi-model approach interleaves some frequency domain watermarking strategies to counteract shortcomings of one strategy by the advantages of other. The original image is divided into spatially disjoint blocks. Watermarking is a way of embedding a mark that hides information in a multimedia carrier. Major issues in Image watermarking are to...
متن کاملDigital Image Data Hiding Techniques: A Comparative Study
With the advancements in the field of digital image processing during the last decade, digital image data hiding techniques such as watermarking, Steganography have gained wide popularity. Digital image watermarking techniques hide a small amount of data into a digital image which, later can be retrieved using some specific retrieval algorithms to prove the copyright of a piece of digital infor...
متن کاملSome New Methodologies for Image Hiding using Steganographic Techniques
Security and memory management are the major demands for electronics devices like ipods, cell phones, pmps, iphones and digital cameras. In this paper, we have suggested a high level of security mechanism by considering the concept of steganography along with the principle of cryptography. Four different methods that can save a considerable amount of memory space have been discussed. Based on t...
متن کاملRobust Image Hiding Method
Image hiding is hiding a secret image embedding to a cover image. This paper intends to propose an image hiding method. First, a secret image is compressed by BST. Meanwhile, dividing the compressed data into different ranks depends on the significance. Then, the cover image is transformed into frequency domain data by discrete wavelet transformation. The dominant part of compressed data is hid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: AL-Rafidain Journal of Computer Sciences and Mathematics
سال: 2010
ISSN: 2311-7990
DOI: 10.33899/csmj.2010.163893