Results 11 to 20 of about 392,009 (311)
Using Fractals in Information Hiding [PDF]
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj +1 more source
Quantum data hiding in the presence of noise [PDF]
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core +3 more sources
Load Hiding of Household's Power Demand [PDF]
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik +2 more
core +1 more source
Information Security Study for Information Hiding in Electronic Computers
Cryptographic technologies are nowadays widely recognized asthe essential tool for security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj +1 more source
Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan +6 more
core +2 more sources
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou +4 more
doaj +1 more source
Steganography: a Class of Algorithms having Secure Properties [PDF]
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M. +2 more
core +1 more source
LSB Data Hiding in Digital Media: A Survey
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.
Dang Ninh Tran +2 more
doaj +1 more source
Image transformation and information hiding technology based on genetic algorithm
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj +1 more source

