Results 1 to 10 of about 392,009 (311)
Text information hiding and recovery via wavelet digital watermarking method [PDF]
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj +2 more sources
Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing [PDF]
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren +3 more
doaj +2 more sources
Information Hiding Over Mobile using Bluetooth [PDF]
Due to the evolution of massive means of communication and the exchange of information has become personal privacy vulnerable to abuse more easily than ever before, so there is a need to adopt the technology more sophisticated and more secret and ...
M Shirali-Shahreza +22 more
doaj +2 more sources
Separation and information hiding [PDF]
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resources of a module from those accessed by the module's clients. The use of a logical connective gives rise to a form of dynamic partitioning, where we track the transfer of ...
O'Hearn, P, Yang, H, Reynolds, J
openaire +4 more sources
Hybrid Information Hiding Technique Using Parametric Spline and DFT [PDF]
Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set
Hanaa M +2 more
doaj +2 more sources
Information Hiding Using Minification
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj +1 more source
Analysis of Information Hiding Techniques in the Texts [PDF]
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj +1 more source
Digital Information Hiding Techniques [PDF]
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where ...
Alyaa Abdul Majeed Haleem +1 more
doaj +1 more source
A New Proposed Coding Method for Steganography Purpose [PDF]
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj +1 more source
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj +1 more source

