Results 11 to 20 of about 392,009 (311)

Using Fractals in Information Hiding [PDF]

open access: yesEngineering and Technology Journal, 2009
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj   +1 more source

Quantum data hiding in the presence of noise [PDF]

open access: yes, 2016
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core   +3 more sources

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

Information Security Study for Information Hiding in Electronic Computers

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2005
Cryptographic technologies are nowadays widely recognized asthe essential tool for  security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj   +1 more source

Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]

open access: yes, 2006
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan   +6 more
core   +2 more sources

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +1 more source

Steganography: a Class of Algorithms having Secure Properties [PDF]

open access: yes, 2011
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M.   +2 more
core   +1 more source

LSB Data Hiding in Digital Media: A Survey

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2022
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.
Dang Ninh Tran   +2 more
doaj   +1 more source

Image transformation and information hiding technology based on genetic algorithm

open access: yesEURASIP Journal on Image and Video Processing, 2018
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy