Journal articles on the topic 'Information hiding (NEW)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information hiding (NEW).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Siddik, Omer, and Ersin Elbasi. "Information Hiding: A New Multi Watermark Algorithm Using Radon Transformation." International Journal of Information and Electronics Engineering 5, no. 6 (2015): 460–63. http://dx.doi.org/10.7763/ijiee.2015.v5.579.
Full textA. Jalab, Hamid, A. A. Zaidan, and B. B. Zaidan. "New Design for Information Hiding with in Steganography Using Distortion Techniques." International Journal of Engineering and Technology 2, no. 1 (2010): 72–77. http://dx.doi.org/10.7763/ijet.2010.v2.103.
Full textMitekin, V. A., and V. A. Fedoseev. "NEW SECURE QIM-BASED INFORMATION HIDING ALGORITHMS." Computer Optics 42, no. 1 (March 30, 2018): 118–27. http://dx.doi.org/10.18287/2412-6179-2018-42-1-118-127.
Full textZhang, Yi, Quan Zhou, Yan-lang Hu, Juan-ni Liu, and Rui-hua Liu. "A new near-lossless image information hiding algorithm with controlled hiding capacity." Journal of Physics: Conference Series 2005, no. 1 (August 1, 2021): 012053. http://dx.doi.org/10.1088/1742-6596/2005/1/012053.
Full textMitekin, V. A., and V. A. Fedoseev. "A NEW ROBUST INFORMATION HIDING METHOD FOR VIDEO." Computer Optics 38, no. 3 (January 1, 2014): 564–73. http://dx.doi.org/10.18287/0134-2452-2014-38-3-564-573.
Full textYUE, Qin, and chen CHEN. "New secrete information hiding method for remote sensing images." Journal of Computer Applications 29, no. 11 (December 28, 2009): 2977–79. http://dx.doi.org/10.3724/sp.j.1087.2009.02977.
Full textCabaj, Krzysztof, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, and Sebastian Zander. "The New Threats of Information Hiding: The Road Ahead." IT Professional 20, no. 3 (May 2018): 31–39. http://dx.doi.org/10.1109/mitp.2018.032501746.
Full textJournal, Baghdad Science. "Optimal Color Model for Information Hidingin Color Images." Baghdad Science Journal 5, no. 4 (December 7, 2008): 686–92. http://dx.doi.org/10.21123/bsj.5.4.686-692.
Full textParah, Shabir A., Farhana Ahad, Javaid A. Sheikh, and G. M. Bhat. "Hiding clinical information in medical images: A new high capacity and reversible data hiding technique." Journal of Biomedical Informatics 66 (February 2017): 214–30. http://dx.doi.org/10.1016/j.jbi.2017.01.006.
Full textWang, Xiao Feng. "Study on the Technology of Information Hiding Based on HTML Tags." Advanced Materials Research 798-799 (September 2013): 423–26. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.423.
Full textSzczypiorski, Krzysztof. "StegHash: New Method for Information Hiding in Open Social Networks." International Journal of Electronics and Telecommunications 62, no. 4 (December 1, 2016): 347–52. http://dx.doi.org/10.1515/eletel-2016-0048.
Full textSun, Shuliang. "A New Information Hiding Method Based on Improved BPCS Steganography." Advances in Multimedia 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/698492.
Full textAwad, Wasan Shaker. "Information Hiding Using Ant Colony Optimization Algorithm." International Journal of Technology Diffusion 2, no. 1 (January 2011): 16–28. http://dx.doi.org/10.4018/jtd.2011010102.
Full textKim, Ki-Jong, Sang-Ho Shin, and Kee-Young Yoo. "A New Information Data Hiding Scheme based on Pattern Information of Secret Data." Journal of Korea Multimedia Society 15, no. 4 (April 30, 2012): 526–39. http://dx.doi.org/10.9717/kmms.2012.15.4.526.
Full textCao, Laicheng, and Hao Zhou. "A New Reversible Date-Hiding Algorithm for Encrypted Images." Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/4313580.
Full textFuller, LaJuan Perronoski. "Foundational Leadership Theory: A New Ethical Approach to Reducing Knowledge-Hiding Practices Among Employees." International Journal of Social Science Studies 9, no. 5 (August 3, 2021): 67. http://dx.doi.org/10.11114/ijsss.v9i5.5286.
Full textPan, Ping, Junzhi Ye, Yun Pan, Lize Gu, and Licheng Wang. "New Commitment Schemes Based on Conjugacy Problems over Rubik’s Groups." Information 12, no. 8 (July 24, 2021): 294. http://dx.doi.org/10.3390/info12080294.
Full textGuo, Fang, Jia Yong Duan, and Hao Jing. "Information Hiding Algorithm Based on Two m-Sequences." Advanced Materials Research 760-762 (September 2013): 2072–76. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2072.
Full textJournal, Baghdad Science. "Building a Reliable Steganography System Using Random Key in a spatial Domain of Image." Baghdad Science Journal 11, no. 2 (June 1, 2014): 265–74. http://dx.doi.org/10.21123/bsj.11.2.265-274.
Full textYang, Yu Jun, and Yi Mei Yang. "A Robust Webpage Information Hiding Method Based on the Slash of Tag." Advanced Engineering Forum 6-7 (September 2012): 361–66. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.361.
Full textMa, Wenyue, Xiaohua Wang, and Yongjun Ren. "A new method of text information hiding based on open channel." International Journal of High Performance Computing and Networking 14, no. 3 (2019): 325. http://dx.doi.org/10.1504/ijhpcn.2019.10023613.
Full textRen, Yongjun, Wenyue Ma, and Xiaohua Wang. "A new method of text information hiding based on open channel." International Journal of High Performance Computing and Networking 14, no. 3 (2019): 325. http://dx.doi.org/10.1504/ijhpcn.2019.102132.
Full textYan, Xuehu, Shen Wang, Ahmed A. Abd El-Latif, and Xiamu Niu. "New approaches for efficient information hiding-based secret image sharing schemes." Signal, Image and Video Processing 9, no. 3 (April 12, 2013): 499–510. http://dx.doi.org/10.1007/s11760-013-0465-y.
Full textWendzel, Steffen, Luca Caviglione, Wojciech Mazurczyk, and Jean-Francois Lalande. "Network Information Hiding and Science 2.0: Can it be a Match?" International Journal of Electronics and Telecommunications 63, no. 2 (June 27, 2017): 217–22. http://dx.doi.org/10.1515/eletel-2017-0029.
Full textAbu-Almash, Fadheela Sabri. "New Steganography System Based on Huffman Coding and Fibonacci Decomposition." Ibn AL- Haitham Journal For Pure and Applied Science 31, no. 1 (May 10, 2018): 231. http://dx.doi.org/10.30526/31.1.1831.
Full textG, Saranya. "An efficient data hiding method in images." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4713. http://dx.doi.org/10.11591/ijece.v9i6.pp4713-4720.
Full textAsaad Zebari, Nichirvan, Dilovan Asaad Zebari, Diyar Qader Zeebaree, and Jwan Najeeb Saeed. "Significant features for steganography techniques using deoxyribonucleic acid: a review." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (January 1, 2021): 338. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp338-347.
Full textSoltani, Mohammad, and Amid Khatibi Bardsiri. "A New Secure Hybrid Algorithm for QR-Code Images Encryption and Steganography." APTIKOM Journal on Computer Science and Information Technologies 2, no. 2 (July 1, 2017): 86–96. http://dx.doi.org/10.11591/aptikom.j.csit.109.
Full textNtahobari, Maurice, and Tohari Ahmad. "Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2468. http://dx.doi.org/10.11591/ijece.v8i4.pp2468-2476.
Full textUnno, Hiroshi, Ronnaporn Yamkum, Chutharat Bunporn, and Kazutake Uehira. "A New Displaying Technology for Information Hiding Using Temporally Brightness Modulated Pattern." IEEE Transactions on Industry Applications 53, no. 1 (January 2017): 596–601. http://dx.doi.org/10.1109/tia.2016.2604217.
Full textKhan, Sahib, Khalil Khan, Arslan Arif, Mahmoud Hassaballah, Jehad Ali, Qui Thanh Hoai Ta, and Lisu Yu. "A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT." Symmetry 12, no. 10 (October 12, 2020): 1659. http://dx.doi.org/10.3390/sym12101659.
Full textMohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Full textGavinsky, Dmitry, and Tsuyoshi Ito. "Quantum fingerprints that keep secrets." Quantum Information and Computation 13, no. 7&8 (May 2013): 583–606. http://dx.doi.org/10.26421/qic13.7-8-3.
Full textHossain, Safwan, Evi Micha, and Nisarg Shah. "The Surprising Power of Hiding Information in Facility Location." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 02 (April 3, 2020): 2168–75. http://dx.doi.org/10.1609/aaai.v34i02.5592.
Full textTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu, and Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function." Security and Communication Networks 2021 (February 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Full textLin, Hui, Jie Lin, and Bo Fu. "Information Hiding and Extracting in Printed Chinese Documents by Missing Feature Method." Advanced Materials Research 765-767 (September 2013): 1524–28. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1524.
Full textZhang, Zelin, Jian Xu, Bin Ma, Chunpeng Wang, Jian Li, and Yuli Wang. "Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding." Security and Communication Networks 2021 (July 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/5511806.
Full textT V S, Gowtham Prasad, Dr S. Varadarajan, Dr S. A. K. Jilani, and Dr G. N. Kodandaramaiah. "Image Steganography Based On Optimal LSB Pixel Adjustment Method." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 1 (May 30, 2013): 1–6. http://dx.doi.org/10.24297/ijct.v5i1.4380.
Full textChe, Sheng Bing, Dong Mei Guo, Ye Mao Wang, and Li Li Pan. "A Software Watermarking Algorithm Based on Binder Technology." Applied Mechanics and Materials 687-691 (November 2014): 2971–74. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2971.
Full textChatterjee, Ayan, and Nikhilesh Barik. "A New Data Hiding Scheme Using Laplace Transformation in Frequency Domain Steganography." International Journal of Hyperconnectivity and the Internet of Things 4, no. 1 (January 2020): 1–12. http://dx.doi.org/10.4018/ijhiot.2020010101.
Full textAbbood, Elaf Ali, Rusul Mohammed Neamah, and Shaymaa Abdulkadhm. "Text in Image Hiding using Developed LSB and Random Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2091. http://dx.doi.org/10.11591/ijece.v8i4.pp2091-2097.
Full textBanawan, Salma, and Ibrahim Kamel. "Hiding Information in Reversible English Transforms for a Blind Receiver." Applied Computational Intelligence and Soft Computing 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/387985.
Full textChe, Sheng Bing, and Hai Yang Wang. "A Fragile Information Hiding Technique Based on Human Visual Gray Sensitivity." Advanced Materials Research 121-122 (June 2010): 1048–51. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.1048.
Full textTiwari, Rajesh Kumar, and G. Sahoo. "Microsoft Excel File." International Journal of Digital Crime and Forensics 3, no. 1 (January 2011): 37–52. http://dx.doi.org/10.4018/jdcf.2011010103.
Full textHtet, May, and Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets." Journal of Computer Science 2, no. 1 (July 16, 2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.
Full textMukherjee, Subhadip, and Biswapati Jana. "A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion." International Journal of Natural Computing Research 8, no. 4 (October 2019): 13–27. http://dx.doi.org/10.4018/ijncr.2019100102.
Full textNaman, Hala A., Naseer Ali Hussien, Mohand Lokman Al-dabag, and Haider Th Salim Alrikabi. "Encryption System for Hiding Information Based on Internet of Things." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 02 (January 26, 2021): 172. http://dx.doi.org/10.3991/ijim.v15i02.19869.
Full textMaji, Giridhar, Sharmistha Mandal, and Soumya Sen. "Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 83–101. http://dx.doi.org/10.4018/ijisp.2020040105.
Full textWang, Eric Ke, and Yun Ming Ye. "A New Text Based CAPTCHA." Applied Mechanics and Materials 373-375 (August 2013): 644–49. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.644.
Full textZhou, Shi Hua, Qiang Zhang, and Xiao Peng Wei. "Image Encryption Based on Genetic Engineering for Image Hiding." Applied Mechanics and Materials 20-23 (January 2010): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1247.
Full text