نتایج جستجو برای: text steganography

تعداد نتایج: 169125  

2015
Ismail Jouny

This paper applies blind source separation or independent component analysis for images that may contain mixtures of text, audio, or other images for steganography purposes. The paper focuses on separating mixtures in the transform domain such as Fourier domain or the Wavelet domain. The study addresses the effectiveness of steganography when using linear mixtures of multimedia components and t...

Journal: :JSW 2013
Gongshen Liu Xiaoyun Ding Bo Su Kui Meng

In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...

Journal: :Journal of Research in Engineering and Applied Sciences 2018

Journal: :IOSR Journal of Computer Engineering 2012

Journal: :Journal of the Korea Industrial Information Systems Research 2016

2013
C. KAVITHA ANTONY JUDICE

Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. Digital Steganography exploits the use of a host data to hide a pie...

Journal: :Journal of Engineering and Applied Sciences 2019

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2019

Journal: :journal of advances in computer research 2014
azin azizifard mohamad qermezkon tahereh postizadeh hamid barati

today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when  there is a connection between user a and b, user a shoul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید