نتایج جستجو برای: text steganography

تعداد نتایج: 169125  

Journal: :Iraqi journal of science 2021

In every system of security, to keep important data confidential, we need a high degree protection. Steganography can be defined as way sending confidential texts through secure medium communications well protecting the information during process transmission. is technology that used protect users' security and privacy. Communication majorly achieved using network SMS, e-mail, so on. The presen...

2012
Rajinder kaur Gurwinder kaur

Proposed paper work concentrates on the secure transmission of text data when digital contents are commonly distributed by Internet and more security attacks are appeared from eavesdropping, data exposure and data tampering. In this paper we concentrate on hiding some secret text into a real time speech signal considering PSNR (Peak-Signal-to-Noise Ratio) and duration of speech signal as key pa...

2015
G. Prabakaran

The Steganography is used for secure communication of information by embedding information in a cover object such as text, image, audio, video without any suspicion. An adaptive image steganography utilizing image denoising algorithm by wavelet thresholding. Adaptive steganography is a spatial case of both spatial and transform technique. Moreover it is introduced as statistics aware embedding ...

Journal: :CoRR 2009
Samir B. Patel Shrikant N. Pradhan Saumitra U. Ambegaokar

With the current development of multiprocessor systems, strive for computing data on such processor have also increased exponentially. If the multi core processors are not fully utilized, then even though we have the computing power the speed is not available to the end users for their respective applications. In accordance to this, the users or application designers also have to design newer a...

2015
G. GUNASEKARAN

Data collection is an essential step in data miningprocess. Collecting data of varying nature and still preserving privacy is essential for many applications. Privacy concerns maypreventdirect sharing of data andhow multipleparties collaboratively conduct data mining withoutbreaching data privacy presents a challenge.Cryptography involves converting a message text into anunreadable cipher and s...

2012
Ching-Yun Chang Stephen Clark

Linguistic steganography is a form of covert communication using natural language to conceal the existence of the hidden message, which is usually achieved by systematically making changes to a cover text. This paper proposes a linguistic steganography method using word ordering as the linguistic transformation. We show that the word ordering technique can be used in conjunction with existing t...

2015
Ravneet Kaur Chander Prabha

Steganography is the technique of hiding secret information within any media like text, images, audio/video and protocol based network. Steganography is an important area of research in recent years involving a number of applications. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. Transform do...

2011
Mohit Garg

The internet has grown rapidly in recent years. This growth has increased the demand for techniques that can ensure information security. In this paper, we propose a text steganography technique that uses html documents as the cover medium to hide secret messages. The use of html documents has a benefit that the existence of a secret message will not be suspicious as html documents are fundamen...

2016
Tomás Pevný Martin Kopp Jakub Kroustek Andrew D. Ker

A recent version of the “Vawtrak” malware used steganography to hide the addresses of the command and control channels in favicons: small images automatically downloaded by the web browser. Since almost all research in steganalysis focuses on natural images, we study how well these methods can detect secret messages in favicons. The study is performed on a large corpus of favicons downloaded fr...

2012
Ching-Yun Chang Stephen Clark

This paper describes two methods for checking the acceptability of adjective deletion in noun phrases. The first method uses the Google n-gram corpus to check the fluency of the remaining context after an adjective is removed. The second method trains an SVM model using n-gram counts and other measures to classify deletable and undeletable adjectives in context. Both methods are evaluated again...

20042005200620072008200920102011201220132014201520162017201820192020202120222023050001000015000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید