نتایج جستجو برای: text hiding
تعداد نتایج: 174024 فیلتر نتایج به سال:
The data in digital images can be manipulated to some extend without being detected by human eyes. An example of such manipulations is insertion of secret information which is often referred to as information hiding. In this research we embedded the secret text data in spatial domain of a given 8 bit gray scale image followed by image compression using IWT on hardware Spartan III(XC3S200TQ144-4...
This paper argues that the relation between temptations and the level of consumption plays a key role in explaining the observed behaviors of the poor. Temptation goods are defined to be the set of goods that generate positive utility for the self that consumes them, but not for any previous self that anticipates that they will be consumed in the future. We show that the assumption of declining...
abstract although music possesses some kind of power and using it has been welcome by many students in language classrooms, it seems that they take a non-serious image of the lesson while listening to songs and they may think that it is a matter of fun. the main objective of the present study was to investigate whether learning a foreign language through musical texts (songs) can have an impac...
This paper argues that the relation between temptations and the level of consumption plays a key role in explaining the observed behaviors of the poor. Temptation goods are defined to be the set of goods that generate positive utility for the self that consumes them, but not for any previous self that anticipates that they will be consumed in the future. We show that the assumption of declining...
We clarify a financial meaning of duality in the semi-infinite programming problem which emerges in the context of determining a derivative price range based only on the no-arbitrage assumption and the observed prices of other derivatives. The interpretation links studies in the above context to studies in stochastic models.
This paper argues for a reinterpretation of Aristotle’s concept of an enthymeme and also his wider informal logic in terms of arguments that are defeasible. They are represented by forms of argument that are called argumentation schemes, considered to be similar to forms of argument found in deductive logic, but different from the foregoing in virtue of their being defeasible. Indeed, the most ...
In this paper, we present a scheme for embedding data in copies (color or monochrome) of predominantly text pages that may also contain color images or graphics. Embedding data imperceptibly in documents or images is a key ingredient of watermarking and data hiding schemes. It is comparatively easy to hide a signal in natural images since the human visual system is less sensitive to signals emb...
In this survey, we first describe the purposes for image hiding. They are Steganography, Image Watermarking and Image Authentication. Classified by hiding methods, image hiding can be divided into pixel-based image hiding, frequency-based image hiding and VQ-based image hiding. In the aspect of pixel-based image hiding, we describe three representative methods, the substitution table technique,...
In today’s era of technology, digital images are used as a medium to transfer the data from one place to another place. This data can be a simple text as well as a complex multimedia file. While transferring the data with these digital images security must be main concern of the authors thus various data hiding algorithms which are also known as steganography techniques has been invented by the...
Steganography, or information hiding, is to conceal the existence of messages so as to protect their confidentiality. We consider deciphering a stegoscript, a text with secret messages embedded within a covertext, and identifying the vocabularies used in the messages, with no knowledge of the vocabularies and grammar in which the script was written. Our research was motivated by the problem of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید