Results 221 to 230 of about 5,757 (274)

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

DATA SECURITY USING AUDIO VIDEO STEGANOGRAPHY

open access: yesInternational Journal of Advance Engineering and Research Development, 2016
openaire   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Audio-video steganography

2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015
Steganography is the art and science of writing messages which is to be hide behind original cover file which may be audio, video or image. In this paper we are working on audio-video steganography which is the combination of Audio steganography and Image steganography, in this we are using computer forensics technique for authentication purpose.
Yugeshwari Kakde   +2 more
openaire   +1 more source

Audio Steganography Using GA

2010 International Conference on Computational Intelligence and Communication Networks, 2010
Audio Steganography is a method that ensures secured data transfer between parties normally in internet community. In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of Audio Steganography.
K Bhowal, A J Pal, G S Tomar, P P Sarkar
openaire   +1 more source

Audio Steganography using ZDT

Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
Steganography is an art and branch of science of hiding data secretly. Steganography can be applied to various digital mediums such as image, text, audio, video, protocols, radio waves, floppy disk, hard drive, network packet etc. Audio steganography uses audio file as the cover medium.
Shivani Sharma   +3 more
openaire   +1 more source

Blowfish–Secured Audio Steganography

2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES), 2019
Data security has become essential to provide secure communication that is free of attacks. A combination of steganography and cryptography provides very secure communication, where steganography hides the secret data and cryptography scrambles the secret data into an unreadable form.
Farah Hemeida   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy