Results 41 to 50 of about 9,838,902 (340)

Text File Hiding Randomly Using Secret Sharing Scheme [PDF]

open access: yesEngineering and Technology Journal, 2018
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection of information from disclosure to unauthorizedpersons.
Yossra Ali, Hussein Mankhi
doaj   +1 more source

Coverless information hiding based on the generation of anime characters

open access: yesEURASIP Journal on Image and Video Processing, 2020
To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only require a huge image database, but also have a very
Yi Cao   +4 more
semanticscholar   +1 more source

Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]

open access: yes, 2006
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan   +6 more
core   +2 more sources

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

open access: yesIEEE Transactions on Information Forensics and Security, 2019
With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud.
Wenting Shen   +4 more
semanticscholar   +1 more source

A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image

open access: yesIEEE Access, 2020
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
semanticscholar   +1 more source

The New Threats of Information Hiding: The Road Ahead [PDF]

open access: yesIT Professional, 2018
A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive data.
Krzysztof Cabaj   +5 more
semanticscholar   +1 more source

Information-theoretic analysis of information hiding [PDF]

open access: yesIEEE Transactions on Information Theory, 2002
An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding.
Joseph A. O'Sullivan, Pierre Moulin
openaire   +2 more sources

Image transformation and information hiding technology based on genetic algorithm

open access: yesEURASIP Journal on Image and Video Processing, 2018
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2017
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj   +1 more source

Home - About - Disclaimer - Privacy