نتایج جستجو برای: text steganography

تعداد نتایج: 169125  

2010
Saddaf Rubab

Steganography is a means to hide the existence of information exchange. Using this technique the sender embeds the secret information in some other media. This is done by replacing useless data in ordinary computer files with some other secret information. The secret information could be simple text, encoded text or images. The media used as the embedding plane could be an image, audio, video o...

2013
Dhananjay M. Dumbere Nitin J. Janwe

Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Steganography is the science of embedding information into the cover image viz., text, video, and image without causing statistically significant modification to the cover image. Combining these two techni...

Journal: :Computer Science Review 2014
Mansi Subhedar Vijay H. Mankar

Steganography and steganalysis are the prominent research fields in information hiding paradigm. Steganography is the science of invisible communication while steganalysis is the detection of steganography. Steganography means “covered writing” that hides the existence of the message itself. Digital steganography provides potential for private and secure communication that has become the necess...

Journal: :EAI Endorsed Transactions on Energy Web 2018

2015
Saurabh Singh Ashutosh Datar

In this paper, we proposed a hash based approach for color image steganography using canny edge detection method. One of the advantages of using edge detection technique is to secure our data. Proposed methodology follows encoding and decoding procedure. For encoding the data in an image we follow a steganography procedure. Steganography is the art of hiding information like-text, audio, video ...

Journal: :CoRR 2015
Khan Muhammad Jamil Ahmad Naeem Ur Rehman Zahoor Jan Rashid Jalal Qureshi

There are five different types of steganography based on the carrier object that is used for embedding the secret information. The carrier object may be images, text, videos, audios or network protocol packets. If the image is used as a carrier, it is called image steganography. Similarly if video is used for hiding secret messages, we call it video steganography and so on[1, 5]. The diagrammat...

2010
Dipti Kapoor Sarmah Neha Bajpai

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are avai...

2015
Khaled Nasser ElSayed

Information transmission is increasing with grow of using WEB. So, information security has become very important. Security of data and information is the major task for scientists and political and military people. One of the most secure methods is embedding data (steganography) in different media like text, audio, digital images. This paper presents two experiments in steganography of digital...

Journal: :JSW 2010
Weihui Dai Yue Yu Yonghui Dai Bin Deng

High transmission efficiency, low resource occupancy and intelligible meaning make text message as the most commonly used type of media in our daily communication. Text steganography, an information hiding technology based on text message, has been a new exploring research in recent years. Due to the restriction of redundant information as well as its alterability in manual operation, text mess...

Journal: :Applied sciences 2021

Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret concealing it in transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, commonly used Internet users their daily activities, resulting vast amount of messages sent s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید