نتایج جستجو برای: text steganography

تعداد نتایج: 169125  

2016
Marwa E. Saleh Fatma A. Omara

Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, th...

2012
ATIF BIN MANSOOR

Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles th...

2012
Fahimeh Alizadeh

Steganography focuses on hiding information in such a way that the message is undetectable for outsiders and only appears to the sender and intended recipient. Portable Document Format (PDF) steganography has not received as much attention as other techniques like image steganography because of the lower capacity and text-based file format, which make it harder to hide data. However some approa...

Journal: :Journal of Southwest Jiaotong University 2020

Journal: :International Journal of Computer Applications 2013

Journal: :Bulletin of Electrical Engineering and Informatics 2021

The enormous development in the utilization of Internet has driven by a continuous improvement region security. enhancement security embedded techniques is applied to save intellectual property. There are numerous types mechanisms. Steganography art and science concealing secret information inside cover media such as image, audio, video text, without drawing any suspicion eavesdropper. text ide...

Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...

Journal: :International Journal of Computer Science and Information Technology 2017

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید