Results 221 to 230 of about 5,757 (274)
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
Data trace as the scientific foundation for trusted metrological data: a review for future metrology direction. [PDF]
Cao Z +5 more
europepmc +1 more source
A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding. [PDF]
Huang L +5 more
europepmc +1 more source
DATA SECURITY USING AUDIO VIDEO STEGANOGRAPHY
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015
Steganography is the art and science of writing messages which is to be hide behind original cover file which may be audio, video or image. In this paper we are working on audio-video steganography which is the combination of Audio steganography and Image steganography, in this we are using computer forensics technique for authentication purpose.
Yugeshwari Kakde +2 more
openaire +1 more source
Steganography is the art and science of writing messages which is to be hide behind original cover file which may be audio, video or image. In this paper we are working on audio-video steganography which is the combination of Audio steganography and Image steganography, in this we are using computer forensics technique for authentication purpose.
Yugeshwari Kakde +2 more
openaire +1 more source
2010 International Conference on Computational Intelligence and Communication Networks, 2010
Audio Steganography is a method that ensures secured data transfer between parties normally in internet community. In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of Audio Steganography.
K Bhowal, A J Pal, G S Tomar, P P Sarkar
openaire +1 more source
Audio Steganography is a method that ensures secured data transfer between parties normally in internet community. In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of Audio Steganography.
K Bhowal, A J Pal, G S Tomar, P P Sarkar
openaire +1 more source
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
Steganography is an art and branch of science of hiding data secretly. Steganography can be applied to various digital mediums such as image, text, audio, video, protocols, radio waves, floppy disk, hard drive, network packet etc. Audio steganography uses audio file as the cover medium.
Shivani Sharma +3 more
openaire +1 more source
Steganography is an art and branch of science of hiding data secretly. Steganography can be applied to various digital mediums such as image, text, audio, video, protocols, radio waves, floppy disk, hard drive, network packet etc. Audio steganography uses audio file as the cover medium.
Shivani Sharma +3 more
openaire +1 more source
Blowfish–Secured Audio Steganography
2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES), 2019Data security has become essential to provide secure communication that is free of attacks. A combination of steganography and cryptography provides very secure communication, where steganography hides the secret data and cryptography scrambles the secret data into an unreadable form.
Farah Hemeida +2 more
openaire +1 more source

