Literatura académica sobre el tema "Information hiding (NEW)"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Information hiding (NEW)".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Information hiding (NEW)"

1

Siddik, Omer y Ersin Elbasi. "Information Hiding: A New Multi Watermark Algorithm Using Radon Transformation". International Journal of Information and Electronics Engineering 5, n.º 6 (2015): 460–63. http://dx.doi.org/10.7763/ijiee.2015.v5.579.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

A. Jalab, Hamid, A. A. Zaidan y B. B. Zaidan. "New Design for Information Hiding with in Steganography Using Distortion Techniques". International Journal of Engineering and Technology 2, n.º 1 (2010): 72–77. http://dx.doi.org/10.7763/ijet.2010.v2.103.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Mitekin, V. A. y V. A. Fedoseev. "NEW SECURE QIM-BASED INFORMATION HIDING ALGORITHMS". Computer Optics 42, n.º 1 (30 de marzo de 2018): 118–27. http://dx.doi.org/10.18287/2412-6179-2018-42-1-118-127.

Texto completo
Resumen
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between key bits and multimedia data samples. To obtain the required security, we use a correlation immune embedding function, which guarantees statistical independence between the watermarked data and the key. The proposed algorithms are described for the case of spatial embedding in images but the algorithms can also be used to hide information in any multimedia data source in spatio-temporal and spectral domains. The results of the experimental investigation have confirmed that the algorithms developed provide the required security against a statistical attack and also have shown that the algorithms do not introduce additional distortions compared with the conventional QIM method. However, the experiments have also shown that the new algorithms are less robust against additive noise and JPEG compression.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Zhang, Yi, Quan Zhou, Yan-lang Hu, Juan-ni Liu y Rui-hua Liu. "A new near-lossless image information hiding algorithm with controlled hiding capacity". Journal of Physics: Conference Series 2005, n.º 1 (1 de agosto de 2021): 012053. http://dx.doi.org/10.1088/1742-6596/2005/1/012053.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Mitekin, V. A. y V. A. Fedoseev. "A NEW ROBUST INFORMATION HIDING METHOD FOR VIDEO". Computer Optics 38, n.º 3 (1 de enero de 2014): 564–73. http://dx.doi.org/10.18287/0134-2452-2014-38-3-564-573.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

YUE, Qin y chen CHEN. "New secrete information hiding method for remote sensing images". Journal of Computer Applications 29, n.º 11 (28 de diciembre de 2009): 2977–79. http://dx.doi.org/10.3724/sp.j.1087.2009.02977.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Cabaj, Krzysztof, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward y Sebastian Zander. "The New Threats of Information Hiding: The Road Ahead". IT Professional 20, n.º 3 (mayo de 2018): 31–39. http://dx.doi.org/10.1109/mitp.2018.032501746.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Journal, Baghdad Science. "Optimal Color Model for Information Hidingin Color Images". Baghdad Science Journal 5, n.º 4 (7 de diciembre de 2008): 686–92. http://dx.doi.org/10.21123/bsj.5.4.686-692.

Texto completo
Resumen
In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Parah, Shabir A., Farhana Ahad, Javaid A. Sheikh y G. M. Bhat. "Hiding clinical information in medical images: A new high capacity and reversible data hiding technique". Journal of Biomedical Informatics 66 (febrero de 2017): 214–30. http://dx.doi.org/10.1016/j.jbi.2017.01.006.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wang, Xiao Feng. "Study on the Technology of Information Hiding Based on HTML Tags". Advanced Materials Research 798-799 (septiembre de 2013): 423–26. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.423.

Texto completo
Resumen
Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Information hiding (NEW)"

1

Harrison, William. "Malleability, obliviousness and aspects for broadcast service attachment". Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4138/.

Texto completo
Resumen
An important characteristic of Service-Oriented Architectures is that clients do not depend on the service implementation's internal assignment of methods to objects. It is perhaps the most important technical characteristic that differentiates them from more common object-oriented solutions. This characteristic makes clients and services malleable, allowing them to be rearranged at run-time as circumstances change. That improvement in malleability is impaired by requiring clients to direct service requests to particular services. Ideally, the clients are totally oblivious to the service structure, as they are to aspect structure in aspect-oriented software. Removing knowledge of a method implementation's location, whether in object or service, requires re-defining the boundary line between programming language and middleware, making clearer specification of dependence on protocols, and bringing the transaction-like concept of failure scopes into language semantics as well. This paper explores consequences and advantages of a transition from object-request brokering to service-request brokering, including the potential to improve our ability to write more parallel software.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chen, Cheng-Wei y 陳政緯. "New Information Hiding Techniques for Digital Images". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00939984701659992211.

Texto completo
Resumen
碩士
國立屏東科技大學
資訊管理系所
96
It is a risk to transmit information in the Internet. How to protect the security of information transmission is becoming popular research topic in recent years. This thesis presents a new information hiding technique using TS (tabu search) and OLSB (optimal least significant bit) substitution named TS-OLSB. An optimal LSB substitution may enhance the quality of stego-image. In addition, a Tabu search can obtain near optimal solution. Therefore, this paper hybridizes Tabu search and optimal LSB substitution for image hiding processing. According to the simulation results, it is observed that the proposed method outperforms optimal LSB substitution and genetic algorithm hybridizes OLSB (GA-OLSB) in time cost and peak-signal-noise-ratio (PSNR) comparisons. This thesis presents another new information hiding technique using improved LSB matching, two-sided side match (TSM) steganography and optimal substitution named ITSM (Improved TSM). This technique divides into two parts. First, using improved LSB matching method may enhance the capacity of stego-image. Second, hybridizing TSM and optimal substitution named optimal TSM that may maintain the quality of stego-image is used. Therefore, this thesis hybridizes improved LSB matching and optimal TSM for image hiding processing. According to the simulation results, it is observed that the proposed method outperforms TSM in capacity and peak-signal-noise-ratio (PSNR) comparisons.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ho, Mei-Hua y 何玫樺. "A New Study on Information Hiding via XPS". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/46078485077493247277.

Texto completo
Resumen
碩士
國立交通大學
資訊科學與工程研究所
98
With the progress of development in computer and networking technologies, digital text documents nowadays have become much more popular than in the past. The XPS (XML Paper Specification) document is a new text file format which is portable to any computer to produce identical page layouts with high printing and browsing qualities. In this study, three data hiding methods utilizing certain properties of the XPS are proposed for covert communication, text authentication, and steganography. For covert communication, the proposed data hiding method uses a single cover image in an XPS document as a data embedding channel. A secret message to hide is encoded as certain rectangular-shaped patterns according to a table designed in this study, and the patterns are described by Path elements in XPS files for use in dividing an image hierarchically in the XPS document. The divided image pieces then are composed together seamlessly to form the original image, thus accomplishing imperceptible data embedding in the document. Furthermore, since XPS documents are widely used on the Internet, malicious users may try to intercept and tamper with their contents. This requires XPS document authentication for which a novel method is proposed in this study. Specifically, the digests of the texts in an XPS document to be protected, after being encoded by specific gradient patterns, are used as authentication signals. To verify the integrity and fidelity of the text content of a suspicious XPS document, the authentication signals extracted from it are compared with those computed from its current text segments for decision making. Finally, keeping secrets in XPS documents without arousing notice from possible attackers is necessary in many information security fields. For this kind of steganographic application, a method inserting specific invisible and width-adjustable ASCII codes between words in the texts of XPS files for encoding secret messages is proposed. The resulting stego-document appears to be identical to the cover document with no width increasing between the text words. Measures to enhance the security of each proposed method are also suggested. Good experimental results show the feasibility of the proposed methods.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

姚志憲. "A New Study on Information Hiding via JPEG XR Images". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88146201748570038950.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Yang, Chih-Jen y 楊志仁. "A Study on New Techniques for Information Hiding Via SVG Files". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/36590094411023572732.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Lai, I.-Jen y 賴怡臻. "Secret-fragment-visible Mosaic—a New Art and Its Applications to Information Hiding". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/97058365171668217409.

Texto completo
Resumen
碩士
國立交通大學
資訊科學與工程研究所
98
iii created from a grayscale image of a secret document, yielding a steganographic effect of hiding the secret document into the mosaic image, though visibly. The selection of the most similar target image from a database is based on a newly-proposed k-feature of the grayscale value, which speeds up the image creation process. Finally, for secret sharing, a secret image is shared to yield multiple secret-fragment-visible mosaic images. In order to disperse tile images evenly in selected target images, the target images take turns randomly to pick appropriate tile images. In addition, various security enhancement measures were proposed to make the embedded data more random to prevent hackers’ attacks. Experimental results show the feasibility of the proposed methods for image creation and data hiding applications. In this study, a new type of art image is created, which is called secret-fragment-visible mosaic image. And this kind of new mosaic image is used for three applications of data hiding, namely, covert communication, steganography, and secret sharing. First, the newly-proposed secret-fragment-visible mosaic image is created to be composed of rectangular-shaped fragments which come from division of a secret image. A new 1-D h-colorscale is proposed to represent the color distribution of an image based on the color feeling of human vision. To create a secret-fragment-visible mosaic image, a new image similarity measure based on the h-colorscale is proposed, and the most similar candidate image from an image database is selected accordingly as a target image. Then, a greedy algorithm is adopted to fit every tile image in the secret image into an appropriate block in the target image. Furthermore, to solve the problem of using an insufficiently-large database, a remedy method by enlarging the size of a target image is also proposed. Secondly, for covert communication, based on the fact that tile images which are in an identical histogram bin have similar colors, the tile images in an identical histogram bin are reordered, or equivalently, the relative positions of the tile images are switched, to embed secret message bits imperceptibly. Third, for image steganography, a grayscale secret-fragment-visible mosaic image is
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Chang, Chun-Pei y 張均培. "Tetromino-based Mosaics — A New Type of Art Image and Its Applications in Information Hiding". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/88844487516724454827.

Texto completo
Resumen
碩士
國立交通大學
多媒體工程研究所
97
A new type of art image is created in this study, namely, tetromino-based mosaic image. Methods for automatic creation of images of this type and data hiding in them are proposed. For the creation of tetromino-based mosaic images, we find all the possible combinations of tetrominoes by a tree enumeration algorithm. A tetromino database is constructed with different colors and tetromino combinations for image creation. We also propose a border enhancement process for improving visual effects of tetromino edges. For data hiding in tetromino-based mosaic images, we utilize two types of features of mosaic images, tetromino combination and color, to embed data. We can hide data by using distinct combinations of tetrominoes. An edge fitting method is used to enhance edge effects by adjusting combinations of tetrominoes using the information obtained by edge detection. In addition, the colors of tetrominoes are also used to hide data by shifting color values of tetrominoes slightly. For watermarking in tetromino-based mosaic images, we propose a removable lossless watermarking method by replacing the colors according to a mapping between two color palettes. Based on this invertible watermarking method, an image steganographic method is also proposed by replacing the colors of the watermark area according to the proposed mapping between the two color palettes. Experimental results show the feasibility of the proposed methods and systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ming, Huang Pei y 黃培銘. "New and Integrated Techniques for Information Hiding inImages for Copyright Protection, Covert Communication, and Tampering Detection". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/81800627792490777048.

Texto completo
Resumen
碩士
國立交通大學
資訊科學系
91
Because of the proliferation of digital images on the Internet, people can carry and transmit information by digital images conveniently. For this purpose, some methods for covert communication are proposed in this study. Besides, with the advances of digital techniques, digital images may be copied or tampered with illegally. To solve such problems, some methods for copyright protection and tampering detection for various types of images are proposed in this study. For grayscale images, a method based on visible watermarking techniques and a human visual model is proposed to protect copyrights and detect image alterations. For binary images, a data hiding method is proposed to embed up to two bits in a 3´3 image block by changing at most just one bit in a block. An authentication method for verifying the fidelity and integrity of binary images is also proposed, which creates authentication signals by rearranging the pixels in image blocks. Three methods integrating various data hiding techniques to embed invisible watermarks, visible watermarks, annotations, and authentication signals into three types of images are finally proposed. Good experimental results prove the feasibility of the proposed methods. Finally, some mechanisms for multiple authorizations of images are proposed and some functions of an image authentication center are also suggested.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Tzeng, Chih-Hsuan y 曾志軒. "New Data Hiding and Authentication Techniques with Distortion Reduction Effects for Protection and Secure Transmission of Digital Information". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/07649907788165262062.

Texto completo
Resumen
博士
國立交通大學
資訊科學系
91
With the advance of hardware and software technologies, digital information can be easily created, seamlessly manipulated, and widely distributed. Therefore, information security has become one of the most critical and challenging problems in recent years. This dissertation is dedicated to solving the problems of protection and secure transmission of digital information. One way to protect various types of digital information is to hide them in images. In this approach, reduction of embedding distortion is one of the major concerns. To design imperceptible data hiding methods, three techniques for distortion reduction are proposed in this study. First, the first technique is based on the new concept of embeddability proposed in this study, which is defined as a measure for checking the quality of stego-images yielded from embedding secret data in cover images. Only embeddable pixels are used to embed data. The other two techniques are proposed for minimizing embedding distortion from a global view. One is based on the use of error-correcting coding to create correctable errors corresponding to the data to be hidden, with the effect of minimizing embedding distortion. These errors can be detected, corrected, and so extracted to recover the hidden data. The other technique is based on providing multiple code holders as candidates for embedding data. An optimal code holder which results in the least embedding distortion is selected to embed data. On the other hand, also proposed are five new techniques for data embedding and four new techniques for solving various digital information hiding and authentication application problems have been developed. More specifically, two methods of data hiding in binary and palette images, and two methods of authentication of binary and palette images are proposed. In the proposed data hiding methods, not only can general digital information be embedded into binary and palette images without introducing noticeable distortion, but also can the credibility of the hidden information be verified. Besides, some tradeoffs between design requirements, including that between image quality and embedding capacity as well as that between the accuracy of authentication and the portability of authentication information, are addressed and solutions for balancing these requirements are proposed. Furthermore, a new method for embedding binary images into cover noise images is proposed. It is argued that there is no need to find a meaningful cover image for data hiding. Instead, a cover noise image which has larger embedding capacity can be used to hide a secret binary image. Nevertheless, a general approach to data hiding based on the employment of error-correcting coding is also proposed. Both embedding of digital information into images and authentication of the results are achieved by the error-correcting as well as error-detection abilities of an error-correcting scheme. On the other hand, a novel content-based authentication method based on the use of digital signatures is proposed. The concept is to extract visual color and edge features, which are invariant to content-preserving manipulations, from image blocks, as digital signatures. The authenticity of each image block can be verified by comparing its features with the corresponding ones recorded in the digital signature. The performances of all the above proposed methods have been evaluated extensively by theoretical analyses and experiments. The results indicate that they are feasible for practical applications.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Information hiding (NEW)"

1

Furon, Teddy y Patrick Bas. "A New Measure of Watermarking Security Applied on QIM". En Information Hiding, 207–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36373-3_14.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Cancelli, Giacomo y Mauro Barni. "MPSteg-color: A New Steganographic Technique for Color Images". En Information Hiding, 1–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77370-2_1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Gul, Gokhan y Fatih Kurugollu. "A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)". En Information Hiding, 71–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24178-9_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Lee, Kwangsoo, Changho Jung, Sangjin Lee y Jongin Lim. "New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography". En Information Hiding, 312–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11558859_23.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Cao, Jian, Jiwu Huang y Jiangqun Ni. "A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness". En Information Hiding, 262–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16435-4_20.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Choi, Jae-Gwi, Ji-Hwan Park y Ki-Ryong Kwon. "Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme". En Information Hiding, 253–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30114-1_18.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Fatima, Eram y Saiful Islam. "A New High Capacity and Reversible Data Hiding Technique for Images". En Information Systems Security, 290–304. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Nafari, Mona, Gholam Hossein Sheisi y Mansour Nejati Jahromi. "New Data Hiding Method Based on Neighboring Correlation of Blocked Image". En Communications in Computer and Information Science, 787–801. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21984-9_65.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Li, Peiya, Jiale Meng y Zefan Sun. "A New JPEG Encryption Scheme Using Adaptive Block Size". En Advances in Intelligent Information Hiding and Multimedia Signal Processing, 140–47. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_18.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Yu, Jie, Hong-Jiang Wang, Jeng-Shyang Pan, Kuo-Chi Chang, Truong-Giang Ngo y Trong-The Nguyen. "A New Optimization Based on Parallelizing Hybrid PSOGSA Algorithm". En Advances in Intelligent Information Hiding and Multimedia Signal Processing, 168–78. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6757-9_22.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Information hiding (NEW)"

1

Kong, Yehao y Jiliang Zhang. "Adversarial Audio: A New Information Hiding Method". En Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-1294.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chunhui Xie, Yimin Cheng y Fubao Wu. "A new detection scheme for Echo Hiding". En 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5688776.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Halder, Tanmoy, Kh Amirul Islam, Anup Pasari y Sunil Karforma. "A New Information Hiding Approach using Haar- Transformation". En 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2018. http://dx.doi.org/10.1109/upcon.2018.8596806.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

MA, Yiping y Jiqing HAN. "A NEW CAPABILITY DESCRIPTION FOR AUDIO INFORMATION HIDING". En 11th Joint International Computer Conference - JICC 2005. WORLD SCIENTIFIC, 2005. http://dx.doi.org/10.1142/9789812701534_0015.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Avci, Derya, Turker Tuncer y Engin Avci. "A new information hiding method for audio signals". En 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355361.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bieniasz, Jędrzej y Krzysztof Szczypiorski. "New method for information hiding in open social networks". En Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, editado por Ryszard S. Romaniuk y Maciej Linczuk. SPIE, 2018. http://dx.doi.org/10.1117/12.2506093.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Lin Guoyuan y Wang Guohui. "A new information hiding method based on word 2007". En 2011 IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2011. http://dx.doi.org/10.1109/icsess.2011.5982428.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Szczypiorski, Krzysztof. "StegIbiza: New method for information hiding in club music". En 2016 2nd International Conference on Frontiers of Signal Processing (ICFSP). IEEE, 2016. http://dx.doi.org/10.1109/icfsp.2016.7802950.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Li Tong. "A new algorithm for information hiding in digital image". En 2012 International Conference on Computer Science and Information Processing (CSIP). IEEE, 2012. http://dx.doi.org/10.1109/csip.2012.6308818.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Jing, Liu y Tang Guangming. "A New Method for Data Hiding Domain Classification". En 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.280.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía