|
|
|
Haidong Zhong, Xianyi Chen and Qinglong Tian
Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. The...
ver más
|
|
|
|
|
|
|
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da...
ver más
|
|
|
|
|
|
|
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi
Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ...
ver más
|
|
|
|
|
|
|
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko
Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic...
ver más
|
|
|
|
|
|
|
Omar Younis Abdulhammed
Pág. 28 - 36
|
|
|
|
|
|
|
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization ...
ver más
|
|
|
|
|
|
|
Ladeh S. Abdulraman, Sheerko R. Hma Salah, Halgurd S. Maghdid, Azhin T. Sabir
Pág. 1 - 7
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cov...
ver más
|
|
|
|
|
|
|
Bhavna Gupta
Steganography is a branch of information hiding. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Video Steganography is the technique of hiding some secret message inside a Video. For ...
ver más
|
|
|
|
|
|
|
Piotr Artiemjew and Aleksandra Kislak-Malinowska
Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means of a...
ver más
|
|
|
|
|
|
|
Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa and Maxim Tanygin
Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system based ...
ver más
|
|
|
|
|
|
|
Marios Anagnostopoulos and John André Seem
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks. Through these channels, they are capable of communicating in a stealthy way, unnoticed by the defenders and bypassing the security mechanisms of protect...
ver más
|
|
|
|
|
|
|
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t...
ver más
|
|
|
|
|
|
|
Ugo Fiore
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs...
ver más
|
|
|
|
|
|
|
Mark Burgin
Knowledge and data representations are important for artificial intelligence (AI), as well as for intelligence in general. Intelligent functioning presupposes efficient operation with knowledge and data representations in particular. At the same time, it...
ver más
|
|
|
|
|
|
|
Pedro Molina-Rodríguez-Navas and Johamna Muñoz Lalinde
Information on the management of local administrations and the actions of the political leaders who govern them is essential for citizens to exercise their political rights. It is therefore necessary for these administrations to provide quality informati...
ver más
|
|
|
|
|
|
|
Peiyuan Qiu, Jialiang Gao, Li Yu and Feng Lu
A Geographic Knowledge Graph (GeoKG) links geographic relation triplets into a large-scale semantic network utilizing the semantic of geo-entities and geo-relations. Unfortunately, the sparsity of geo-related information distribution on the web leads to ...
ver más
|
|
|
|
|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Max Friedrich and Mark Vollrath
The envisioned introduction of autonomous Small Unmanned Aircraft Systems (sUAS) into low-altitude urban airspace necessitates high levels of system safety. Despite increased system autonomy, humans will most likely remain an essential component in assur...
ver más
|
|
|
|
|
|
|
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ...
ver más
|
|
|
|
|
|
|
Chin-Chen Chang, Jui-Feng Chang, Wei-Jiun Kao and Ji-Hwei Horng
During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression ...
ver más
|
|
|
|