Results 11 to 20 of about 390,993 (284)

Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing

open access: yesIEEE Access, 2020
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren   +3 more
doaj   +1 more source

Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]

open access: yes, 2006
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan   +6 more
core   +2 more sources

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +1 more source

Steganography: a Class of Algorithms having Secure Properties [PDF]

open access: yes, 2011
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M.   +2 more
core   +1 more source

Hybrid Information Hiding Technique Using Parametric Spline and DFT [PDF]

open access: yesEngineering and Technology Journal, 2010
Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set
Hanaa M   +2 more
doaj   +1 more source

LSB Data Hiding in Digital Media: A Survey

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2022
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.
Dang Ninh Tran   +2 more
doaj   +1 more source

Image transformation and information hiding technology based on genetic algorithm

open access: yesEURASIP Journal on Image and Video Processing, 2018
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj   +1 more source

Text File Hiding Randomly Using Secret Sharing Scheme [PDF]

open access: yesEngineering and Technology Journal, 2018
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection of information from disclosure to unauthorizedpersons.
Yossra Ali, Hussein Mankhi
doaj   +1 more source

Image encryption algorithm based on reversible information hiding and physical chaos in images

open access: yesResults in Physics, 2023
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small ...
Pengcheng Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy