Results 1 to 10 of about 390,993 (284)

Text information hiding and recovery via wavelet digital watermarking method [PDF]

open access: yesScientific Reports, 2023
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj   +2 more sources

Information Hiding Using Minification

open access: yesIEEE Access, 2021
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj   +1 more source

Analysis of Information Hiding Techniques in the Texts [PDF]

open access: yesEngineering and Technology Journal, 2005
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj   +1 more source

Digital Information Hiding Techniques [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where ...
Alyaa Abdul Majeed Haleem   +1 more
doaj   +1 more source

A New Proposed Coding Method for Steganography Purpose [PDF]

open access: yesEngineering and Technology Journal, 2021
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj   +1 more source

Structured Medical Pathology Data Hiding Information Association Mining Algorithm Based on Optimized Convolutional Neural Network

open access: yesIEEE Access, 2020
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj   +1 more source

Using Fractals in Information Hiding [PDF]

open access: yesEngineering and Technology Journal, 2009
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj   +1 more source

Quantum data hiding in the presence of noise [PDF]

open access: yes, 2016
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core   +3 more sources

Information Security Study for Information Hiding in Electronic Computers

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2005
Cryptographic technologies are nowadays widely recognized asthe essential tool for  security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj   +1 more source

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy