نتایج جستجو برای: lsb embedding
تعداد نتایج: 74641 فیلتر نتایج به سال:
<p>Information is a vitalthing that needs to be secured and well protected during transmission between two or more parties over the internet. This can achieved by steganography technology. Steganography concealing science in which information concealed inside other way cannot detectable human eye. Many ways are available hide data cover media for example text, image, audio steganography, ...
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. We introduce the concept of a weighted stego image and then formulate the problem of determining the unknown message length as a simple optimization problem. The methodology is further refined to obtain more stable and...
Information security is concerned with maintaining the secrecy, reliability and accessibility of data. The main objective of information security is to protect information and information system from unauthorized access, revelation, disruption, alteration, annihilation and use. This paper uses spatial domain LSB substitution method for information embedding and Arnold’s transform is applied twi...
Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of the image. Enhancing the proposed method has been done by repeating the watermark data certain n...
The objective of this study was to evaluate genetic and phenotypic parameters for some reproductive traits of Black Bengal does. Genetic parameters were estimated by Residual Maximum Likelihood procedure, fitting an animal model ignoring maternal genetic or permanent environmental effects. The least-squares means of litter size at birth (LSB), litter size at weaning (LSW), litter weight at birt...
Keamanan merupakan salah satu aspek penting dalam proses pertukaran informasi (pesan). Untuk mencegah penyalahgunaan atau serangan oleh pihak yang tidak berwenang (attacker) terhadap pesan bersifat privasi, maka tersebut harus diamankan. Ada beberapa metode dapat digunakan mengamankan pesan, satunya adalah dengan mengombinasikan kriptografi Triple Data Encryption Standard (DES), pembangkit bila...
Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several ...
Image steganography is art of hiding information onto the cover image. In this proposal a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as FDSZT, has been proposed. ZTransform is applied on 2×2 masks of the source image in row major order to transform original sub image (cover image) block to its corresponding frequency domain. One ...
In this papel; we propose a new method for invisibly watermarking high-quality color and gray-scale images. This method is intendedfor use in image ver$cation applications, where one is interested in knowing whether the content of an image has been altered since some earlier time, perhaps because of the act of a malicious party. It consists of both a watermark stamping process which embeds a wa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید