نتایج جستجو برای: text hiding
تعداد نتایج: 174024 فیلتر نتایج به سال:
In this paper we review different Steganography techniques for hiding the data. Steganography is a technique of hiding the data in any media in such a way that it remains confidential. This paper explores the different method of data hiding: image steganography, audio steganography, video steganography, text steganography, steganography in spatial domain, transform domain and adaptive steganogr...
In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-rand...
In this paper, we deal with the problem of authentication and tamper-proofing of text documents that can be distributed in electronic or printed forms. We advocate the combination of robust text hashing and text datahiding technologies as an efficient solution to this problem. First, we consider the problem of text data-hiding in the scope of the Gel’fand-Pinsker data-hiding framework. For illu...
Proposed paper work concentrates on the secure transmission of text data when digital contents are commonly distributed by Internet and more security attacks are appeared from eavesdropping, data exposure and data tampering. In this paper we concentrate on hiding some secret text into a real time speech signal considering PSNR (Peak-Signal-to-Noise Ratio) and duration of speech signal as key pa...
Recently, several algorithms have been developed to hide data in either text images or halftone images. According to an observation that the number of transitions between black pixel and white pixel in the halftone image is much larger than that in the text image, this paper presents a unified min-max transition (MMT) scheme to embed data into the above two types of images without visual degrad...
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter, thereby increasing the efficiency of secret sharing. We present applications of our proposed protocol to images as well as text.
This paper shows the possibility of exploiting the features of Ecipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decryptin...
Computer technology and the Internet have made a breakthrough in the existence of data communication. This has opened a whole new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding the message in the carrier file enables the deniability of the existence of any message at all. This paper designs a stego machine to dev...
The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold method. becomes an efficient method to ensure secure transmission. Some visual cryptography techniques don’t guarantee security transmission because the secret information can be retrieved if hackers obtain number of shares. This study present with hiding based on YCbCr color space. proposed text file or image ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید