نتایج جستجو برای: most of them being significant

تعداد نتایج: 21195253  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

within the components of communicative competence, a special emphasis is put on the “rules of politeness,” specifically the politeness strategies (brown and levinson, 1978) that speakers deploy when performing the request speech act. this is because the degree of imposition that making a request places upon one’s interlocutor(s) has been seen to be influenced by several factors among which, as ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1394

adaptation of the lord of the rings is considered by many to be among the greatest, most successful and at the same time most popular of the above mentioned trend so far. it is my intention to look at the success and popularity of this epic fantasy in the light of the 9/11 attacks and the war on terror context of g. w. bush’s aura. in so doing i aim at bringing into the light the determining fa...

2012
B.Ramesh Kumar Raja Krishna Kumar

Steganography is the concept of embedding information in such a way that its existence is concealed. In this paper we have shown one of the techniques used in Steganography to hide information and deliver the message to the end user using Bit-planes without any loss of data. The method used is to replace lowest 3 or 4 LSB with message bits or image data (assume 8 bit values). We do this method ...

Journal: :CoRR 2017
Hamzeh Ghasemzadeh Meisam Khalil Arjmandi

Calibration and higher order statistics (HOS) are standard components of many image steganalysis systems. These techniques have not yet found adequate attention in audio steganalysis context. Specifically, most of current works are either non-calibrated or only based on noise removal approach. This paper aims to fill these gaps by proposing a new set of calibrated features based on re-embedding...

2010
Jagdeep Kaur

Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret me...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده شیمی 1389

in this thesis, a new optically active poly(amide-imide) (pai) was synthesized by the indirect polycondensation reaction of the l-phenylalanine based diacid chloride and 4,4?-diaminodiphenylether in the presence of triethylamine in n-methyl-2-pyrrolidone. the formation of pai was confirmed by ftir, 1h nmr and elemental analysis. in next step, the surface of titanium dioxide (tio2) nanoparticles...

2012
Ankita Agarwal A. K. Vatsa

In today’s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. The threat of an intruder and Steganalysis accessing secret information for sharing information over an unsecure or covert communication channels are vulnerable to intruder attacks. Although, these techniq...

2007
Ryuta Nara Kazunori Shimizu Shunitsu Kohara Nozomu Togawa Masao Yanagisawa Tatsuo Ohtsuki

In this paper, we propose an MSD (most significant digit) multiplier based on an MSB (most significant bit) multiplier over GF(2). The proposed multiplier is based on connecting D (digit size)-bit bit-operations in series. In each digit operation in our proposed multiplier, the “left shift and reduction operation” is serially performed for each of D bits. Because registers for storing intermedi...

Journal: :CoRR 2016
M. Hassan Najafi David J. Lilja

This work proposes a high-capacity scheme for separable reversible data hiding in encrypted images. At the sender side, the original uncompressed image is encrypted using an encryption key. One or several data hiders use the MSB of some image pixels to hide additional data. Given the encrypted image containing this additional data, with only one of those data hiding keys, the receiver can extra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید