Results 11 to 20 of about 391,871 (286)
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou +4 more
doaj +3 more sources
Information Security Study for Information Hiding in Electronic Computers
Cryptographic technologies are nowadays widely recognized asthe essential tool for security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj +1 more source
Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren +3 more
doaj +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
Image transformation and information hiding technology based on genetic algorithm
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj +1 more source
Hybrid Information Hiding Technique Using Parametric Spline and DFT [PDF]
Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set
Hanaa M +2 more
doaj +1 more source
LSB Data Hiding in Digital Media: A Survey
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.
Dang Ninh Tran +2 more
doaj +1 more source
Image encryption algorithm based on reversible information hiding and physical chaos in images
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small ...
Pengcheng Liu
doaj +1 more source
Steganography: a Class of Algorithms having Secure Properties [PDF]
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M. +2 more
core +1 more source
Hiding information in electoral competition [PDF]
The authors consider the model of an election with two candidates and one representative voter. A candidate can choose one of two policy alternatives: \(B\) (building a bridge) and \(N\) (not building a bridge). There are two states of the world \(\omega_B\) (the costs of the building will be modest) and \(\omega_N\) (building will be very costly). The
Lagerlöf, J, Heidhues, P
openaire +6 more sources

