29   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Haidong Zhong, Xianyi Chen and Qinglong Tian    
Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. The... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi     Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ... ver más

 
en línea
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko     Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Omar Younis Abdulhammed     Pág. 28 - 36
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li    
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ladeh S. Abdulraman, Sheerko R. Hma Salah, Halgurd S. Maghdid, Azhin T. Sabir     Pág. 1 - 7
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cov... ver más
Revista: Innovaciencia    Formato: Electrónico

 
en línea
Bhavna Gupta    
Steganography is a branch of information hiding. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Video Steganography is the technique of hiding some secret message inside a Video. For ... ver más

 
en línea
Piotr Artiemjew and Aleksandra Kislak-Malinowska    
Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means of a... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa and Maxim Tanygin    
Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system based ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Marios Anagnostopoulos and John André Seem    
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks. Through these channels, they are capable of communicating in a stealthy way, unnoticed by the defenders and bypassing the security mechanisms of protect... ver más
Revista: Information    Formato: Electrónico

 
en línea
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang    
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ugo Fiore    
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mark Burgin    
Knowledge and data representations are important for artificial intelligence (AI), as well as for intelligence in general. Intelligent functioning presupposes efficient operation with knowledge and data representations in particular. At the same time, it... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Pedro Molina-Rodríguez-Navas and Johamna Muñoz Lalinde    
Information on the management of local administrations and the actions of the political leaders who govern them is essential for citizens to exercise their political rights. It is therefore necessary for these administrations to provide quality informati... ver más
Revista: Information    Formato: Electrónico

 
en línea
Peiyuan Qiu, Jialiang Gao, Li Yu and Feng Lu    
A Geographic Knowledge Graph (GeoKG) links geographic relation triplets into a large-scale semantic network utilizing the semantic of geo-entities and geo-relations. Unfortunately, the sparsity of geo-related information distribution on the web leads to ... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Max Friedrich and Mark Vollrath    
The envisioned introduction of autonomous Small Unmanned Aircraft Systems (sUAS) into low-altitude urban airspace necessitates high levels of system safety. Despite increased system autonomy, humans will most likely remain an essential component in assur... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng    
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chin-Chen Chang, Jui-Feng Chang, Wei-Jiun Kao and Ji-Hwei Horng    
During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »