نتایج جستجو برای: text hiding
تعداد نتایج: 174024 فیلتر نتایج به سال:
Steganography is the powerful tool for hiding information inside useful cover medium in ways such that the hidden message is undetectable. In Greek language, stego means covered or secret and graphy means to write. Hence, steganography means covered writing. Transform domain steganography is one of the techniques used for hidden exchange of information in frequency domain and it can be defined ...
Now-a-days, digital communication is part of every computing system. As the usage is increasing in every aspect of data transfer and sharing; so is the threat of information stealing and security. Data Security over the public network is the major concern of every communication expert. Cryptography and Steganography are the major techniques employed for hiding and securing the data from the cha...
ABSTRACT: Steganography hides the existence of the data inside any cover file. There are different file formats used in steganography like text, image, audio and video. Out of these file formats image steganography is followed in this paper .One of the major objective of hiding data using image steganography is to hide the data in an image, so that the changes in the intensity of the colors of ...
Steganography is the technique of hiding secret information within any media like text, images, audio/video and protocol based network. Steganography is an important area of research in recent years involving a number of applications. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. Transform do...
Sound to meaning correspondences in spoken language are assumed to be largely arbitrary. However, research has identified a number of exceptions to the arbitrariness assumption. In particular, non-arbitrary mappings between sound and shape, the bouba/kiki effect, have been documented across diverse languages and both children and adults are sensitive to this type of sound symbolic mapping. The ...
In previous research the proposed system has determined the identity proof for the voters using hashing algorithms (MD5 and SHA1) through internet. From those results it founds that the security is not sufficient for the data. To protect the election accuracy, different methods have been proposed for hiding information. In this paper the proposed system embedded the information. The embedding i...
One of the highest priorities in era information technology is to achieve an accurate and effective system for hiding security data. goals steganography imperceptability intruder. So this paper work increase imperceptibility on image, which has weaknesses previous studies, as well avoid statistical attacks such chi-square. A method been proposed that includes calculating color contrasts homogen...
we propose a modified collage steganography using the modified fuzzy c-means algorithm on images. It consists of object images and cover image. Object image consists of the secret message which is to be embedded on the cover image. A proper cover image has to be chose based on the prior analysis. The fuzzy based approach has been formulated for each object image which is to be placed on cover i...
The best ebooks about Association Rule Hiding For Data Mining that you can get for free here by download this Association Rule Hiding For Data Mining and save to your desktop. This ebooks is under topic such as association rule hiding for data mining springer association rule hiding for data mining advances in association rule hiding knowledge and data engineering an efficient association rule ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید