Results 41 to 50 of about 9,838,902 (340)
Text File Hiding Randomly Using Secret Sharing Scheme [PDF]
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection of information from disclosure to unauthorizedpersons.
Yossra Ali, Hussein Mankhi
doaj +1 more source
Coverless information hiding based on the generation of anime characters
To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only require a huge image database, but also have a very
Yi Cao+4 more
semanticscholar +1 more source
Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan+6 more
core +2 more sources
With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud.
Wenting Shen+4 more
semanticscholar +1 more source
A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
semanticscholar +1 more source
The New Threats of Information Hiding: The Road Ahead [PDF]
A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive data.
Krzysztof Cabaj+5 more
semanticscholar +1 more source
Information-theoretic analysis of information hiding [PDF]
An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding.
Joseph A. O'Sullivan, Pierre Moulin
openaire +2 more sources
Image transformation and information hiding technology based on genetic algorithm
Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation.
Xiaowei Gu, Yiqin Sun
doaj +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.+2 more
core +3 more sources
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj +1 more source