Results 11 to 20 of about 391,871 (286)

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +3 more sources

Information Security Study for Information Hiding in Electronic Computers

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2005
Cryptographic technologies are nowadays widely recognized asthe essential tool for  security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj   +1 more source

Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing

open access: yesIEEE Access, 2020
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren   +3 more
doaj   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Image transformation and information hiding technology based on genetic algorithm

open access: yesEURASIP Journal on Image and Video Processing, 2018
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj   +1 more source

Hybrid Information Hiding Technique Using Parametric Spline and DFT [PDF]

open access: yesEngineering and Technology Journal, 2010
Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set
Hanaa M   +2 more
doaj   +1 more source

LSB Data Hiding in Digital Media: A Survey

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2022
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.
Dang Ninh Tran   +2 more
doaj   +1 more source

Image encryption algorithm based on reversible information hiding and physical chaos in images

open access: yesResults in Physics, 2023
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small ...
Pengcheng Liu
doaj   +1 more source

Steganography: a Class of Algorithms having Secure Properties [PDF]

open access: yes, 2011
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M.   +2 more
core   +1 more source

Hiding information in electoral competition [PDF]

open access: yesGames and Economic Behavior, 2003
The authors consider the model of an election with two candidates and one representative voter. A candidate can choose one of two policy alternatives: \(B\) (building a bridge) and \(N\) (not building a bridge). There are two states of the world \(\omega_B\) (the costs of the building will be modest) and \(\omega_N\) (building will be very costly). The
Lagerlöf, J, Heidhues, P
openaire   +6 more sources

Home - About - Disclaimer - Privacy