نتایج جستجو برای: most of them being significant
تعداد نتایج: 21195253 فیلتر نتایج به سال:
within the components of communicative competence, a special emphasis is put on the “rules of politeness,” specifically the politeness strategies (brown and levinson, 1978) that speakers deploy when performing the request speech act. this is because the degree of imposition that making a request places upon one’s interlocutor(s) has been seen to be influenced by several factors among which, as ...
adaptation of the lord of the rings is considered by many to be among the greatest, most successful and at the same time most popular of the above mentioned trend so far. it is my intention to look at the success and popularity of this epic fantasy in the light of the 9/11 attacks and the war on terror context of g. w. bush’s aura. in so doing i aim at bringing into the light the determining fa...
Steganography is the concept of embedding information in such a way that its existence is concealed. In this paper we have shown one of the techniques used in Steganography to hide information and deliver the message to the end user using Bit-planes without any loss of data. The method used is to replace lowest 3 or 4 LSB with message bits or image data (assume 8 bit values). We do this method ...
Calibration and higher order statistics (HOS) are standard components of many image steganalysis systems. These techniques have not yet found adequate attention in audio steganalysis context. Specifically, most of current works are either non-calibrated or only based on noise removal approach. This paper aims to fill these gaps by proposing a new set of calibrated features based on re-embedding...
Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret me...
in this thesis, a new optically active poly(amide-imide) (pai) was synthesized by the indirect polycondensation reaction of the l-phenylalanine based diacid chloride and 4,4?-diaminodiphenylether in the presence of triethylamine in n-methyl-2-pyrrolidone. the formation of pai was confirmed by ftir, 1h nmr and elemental analysis. in next step, the surface of titanium dioxide (tio2) nanoparticles...
In today’s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. The threat of an intruder and Steganalysis accessing secret information for sharing information over an unsecure or covert communication channels are vulnerable to intruder attacks. Although, these techniq...
In this paper, we propose an MSD (most significant digit) multiplier based on an MSB (most significant bit) multiplier over GF(2). The proposed multiplier is based on connecting D (digit size)-bit bit-operations in series. In each digit operation in our proposed multiplier, the “left shift and reduction operation” is serially performed for each of D bits. Because registers for storing intermedi...
This work proposes a high-capacity scheme for separable reversible data hiding in encrypted images. At the sender side, the original uncompressed image is encrypted using an encryption key. One or several data hiders use the MSB of some image pixels to hide additional data. Given the encrypted image containing this additional data, with only one of those data hiding keys, the receiver can extra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید