Results 1 to 10 of about 390,993 (284)
Text information hiding and recovery via wavelet digital watermarking method [PDF]
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj +2 more sources
Information Hiding Using Minification
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj +1 more source
Analysis of Information Hiding Techniques in the Texts [PDF]
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj +1 more source
Digital Information Hiding Techniques [PDF]
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where ...
Alyaa Abdul Majeed Haleem +1 more
doaj +1 more source
A New Proposed Coding Method for Steganography Purpose [PDF]
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj +1 more source
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj +1 more source
Using Fractals in Information Hiding [PDF]
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj +1 more source
Quantum data hiding in the presence of noise [PDF]
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core +3 more sources
Information Security Study for Information Hiding in Electronic Computers
Cryptographic technologies are nowadays widely recognized asthe essential tool for security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj +1 more source
Load Hiding of Household's Power Demand [PDF]
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik +2 more
core +1 more source

