
Steganography
-
Lecture Steganography: Introduction of Mr. Ho Dac Hung provides problem messages, covers objects, cryptosystems, steganographic keys (stego key), steganography throughout history, and modern steganography. Download this lecture to see more.
30p
lavender2022
22-04-2022
12
1
Download
-
Lecture Steganography: Digital Image Formats has contents such as Color representation, Spatial-domain formats, and Transform-domain formats. Download this lecture to see more.
34p
lavender2022
22-04-2022
16
1
Download
-
Lecture Steganography: Steganographic channels introduce contents such as problem, steganography by the cover selection, steganography by cover synthesis, steganography by cover modification
19p
lavender2022
22-04-2022
8
1
Download
-
Lecture Steganography: Naive steganography has contents such as LSB embedding and steganography in palette images. Download this lecture to see more.
35p
lavender2022
22-04-2022
14
1
Download
-
In the lecture Steganography: Watermarking, Mr. Ho Dac Hung introduces contents such as Terminology, Watermarking Principles, and Watermarking Applications. Download this lecture to see more, please!
14p
lavender2022
22-04-2022
14
1
Download
-
Lecture Steganography: Watermarking techniques deal with contents such as the choice of host locations in the cover and the choice of a workspace, discrete Fourier transform, discrete cosine transform, Mellin-Fourier transform
11p
lavender2022
22-04-2022
11
1
Download
-
Audio Watermarking introduces content such as applications, ownership protection applications, content authentication applications, requirements, perceptual transparency attacks, and algorithms. Download this lecture to see more.
14p
lavender2022
22-04-2022
10
1
Download
-
Đề tài nghiên cứu này nghiên cứu và tìm hiểu một số kỹ thuật giấu tin trong âm thanh với cả hai hình thức Watermarking và Steganography. Dựa vào cơ sở nghiên cứu được xây dựng chương trình giấu tin trong tín hiệu âm thanh với nhiều kiểu dữ liệu thông tin có thể giấu trong audio: văn bản, ảnh nhị phân, ảnh cấp xám hay một đoạn audio.
45p
bobietbay
22-12-2021
22
0
Download
-
The purpose of the dissertation is to research on the development of new and quality solutions using graph theory and automata, suggesting their applications in, and applying them to steganography and searchable encryption.
98p
capheviahe26
02-02-2021
15
0
Download
-
In recent times, the application of deoxyribonucleic acid (DNA) has diversified with the emergence of fields such as DNA computing and DNA data embedding. DNA data embedding, also known as DNA watermarking or DNA steganography, aims to develop robust algorithms for encoding non-genetic information in DNA.
16p
viwyoming2711
16-12-2020
13
1
Download
-
Bài báo này trình bày một hệ thống truyền tin mật an toàn, kết hợp các thuật toán mã hóa mạnh mẽ nhất (AES, RSA và SHA3) với kỹ thuật giấu tin trong video 3D. Sự kết hợp này tạo nên một hệ thống truyền tin mật mạnh mẽ trước nhiều loại tấn công thám mã và giả mạo. Dữ liệu mật sẽ được mã hóa bởi các thuật toán đủ mạnh trước khi nhúng vào video 3D bằng kỹ thuật Steganography.
8p
esperanzahuynh
02-06-2020
29
1
Download
-
In this contribution, criteria for the sequences employed in spread spectrum (SS) watermarking and steganography are discussed. These criteria are: Sharp autocorrelation function (ACF), large linear complexity (LC), large length (L), normal distribution assumption and bi-polar.
12p
viengland2711
23-07-2019
22
0
Download
-
Providers of cloud give opportunity to customers to avoid start-up costs and reduce operating cost and access data properly. So to increase security in cloud computing steganography technique is used using genetic algorithm. This will protect stored data in cloud from unauthorized access.
5p
hongnhan878
12-04-2019
25
0
Download
-
This paper presents the issues and challenges faced for image steganographic techniques. Many LSB method techniques were developed in recent year using direct or un-direct position to embed secret message into cover. Some techniques for embedding information in Image files were reviewed, and recommendations are being proposed for the best strategy of hide information in image files and the possibility of finding other new techniques hiding information in image files.
4p
byphasse043256
22-03-2019
20
0
Download
-
This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs) of cover pixels. The result image is also known as steganography image.
4p
byphasse043256
21-03-2019
12
0
Download
-
The term "biometrics" is derived from the Greek words bio means “life” and metric means “to measure”. In this paper, a detailed experimental study of physiology biometrics (face, iris) detection, face detection algorithms based on “Skin Color” has been made.
9p
girlsseek
27-02-2019
18
1
Download
-
In this paper, we studied the various existing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also discussed.
23p
girlsseek
27-02-2019
16
0
Download
-
Instead of embedding secret data anywhere in image, it will be embedded in only skin tone region. This skin region provides excellent secure location for data hiding. So, firstly skin detection is performed in cover images and then Secret data embedding will be performed in DWT domain as DWT gives better performance than DCT while compression. This biometric method of Steganography enhances robustness than existing methods.
4p
girlsseek
27-02-2019
18
1
Download
-
Bài viết đề xuất phương pháp cải tiến để nâng cao tính năng bảo mật của các phương pháp truyền thống thông qua việc sử dụng khái niệm khóa động (dynamic stego-key) để che giấu thông tin trong các tài liệu thẻ. mời các bạn cùng tham khảo nội dung chi tiết.
12p
thuplato
17-05-2016
92
5
Download
-
Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms
4p
levuphongqn
18-08-2015
68
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
