Artículos de revistas sobre el tema "Information hiding (NEW)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Information hiding (NEW)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Siddik, Omer y Ersin Elbasi. "Information Hiding: A New Multi Watermark Algorithm Using Radon Transformation". International Journal of Information and Electronics Engineering 5, n.º 6 (2015): 460–63. http://dx.doi.org/10.7763/ijiee.2015.v5.579.
Texto completoA. Jalab, Hamid, A. A. Zaidan y B. B. Zaidan. "New Design for Information Hiding with in Steganography Using Distortion Techniques". International Journal of Engineering and Technology 2, n.º 1 (2010): 72–77. http://dx.doi.org/10.7763/ijet.2010.v2.103.
Texto completoMitekin, V. A. y V. A. Fedoseev. "NEW SECURE QIM-BASED INFORMATION HIDING ALGORITHMS". Computer Optics 42, n.º 1 (30 de marzo de 2018): 118–27. http://dx.doi.org/10.18287/2412-6179-2018-42-1-118-127.
Texto completoZhang, Yi, Quan Zhou, Yan-lang Hu, Juan-ni Liu y Rui-hua Liu. "A new near-lossless image information hiding algorithm with controlled hiding capacity". Journal of Physics: Conference Series 2005, n.º 1 (1 de agosto de 2021): 012053. http://dx.doi.org/10.1088/1742-6596/2005/1/012053.
Texto completoMitekin, V. A. y V. A. Fedoseev. "A NEW ROBUST INFORMATION HIDING METHOD FOR VIDEO". Computer Optics 38, n.º 3 (1 de enero de 2014): 564–73. http://dx.doi.org/10.18287/0134-2452-2014-38-3-564-573.
Texto completoYUE, Qin y chen CHEN. "New secrete information hiding method for remote sensing images". Journal of Computer Applications 29, n.º 11 (28 de diciembre de 2009): 2977–79. http://dx.doi.org/10.3724/sp.j.1087.2009.02977.
Texto completoCabaj, Krzysztof, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward y Sebastian Zander. "The New Threats of Information Hiding: The Road Ahead". IT Professional 20, n.º 3 (mayo de 2018): 31–39. http://dx.doi.org/10.1109/mitp.2018.032501746.
Texto completoJournal, Baghdad Science. "Optimal Color Model for Information Hidingin Color Images". Baghdad Science Journal 5, n.º 4 (7 de diciembre de 2008): 686–92. http://dx.doi.org/10.21123/bsj.5.4.686-692.
Texto completoParah, Shabir A., Farhana Ahad, Javaid A. Sheikh y G. M. Bhat. "Hiding clinical information in medical images: A new high capacity and reversible data hiding technique". Journal of Biomedical Informatics 66 (febrero de 2017): 214–30. http://dx.doi.org/10.1016/j.jbi.2017.01.006.
Texto completoWang, Xiao Feng. "Study on the Technology of Information Hiding Based on HTML Tags". Advanced Materials Research 798-799 (septiembre de 2013): 423–26. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.423.
Texto completoSzczypiorski, Krzysztof. "StegHash: New Method for Information Hiding in Open Social Networks". International Journal of Electronics and Telecommunications 62, n.º 4 (1 de diciembre de 2016): 347–52. http://dx.doi.org/10.1515/eletel-2016-0048.
Texto completoSun, Shuliang. "A New Information Hiding Method Based on Improved BPCS Steganography". Advances in Multimedia 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/698492.
Texto completoAwad, Wasan Shaker. "Information Hiding Using Ant Colony Optimization Algorithm". International Journal of Technology Diffusion 2, n.º 1 (enero de 2011): 16–28. http://dx.doi.org/10.4018/jtd.2011010102.
Texto completoKim, Ki-Jong, Sang-Ho Shin y Kee-Young Yoo. "A New Information Data Hiding Scheme based on Pattern Information of Secret Data". Journal of Korea Multimedia Society 15, n.º 4 (30 de abril de 2012): 526–39. http://dx.doi.org/10.9717/kmms.2012.15.4.526.
Texto completoCao, Laicheng y Hao Zhou. "A New Reversible Date-Hiding Algorithm for Encrypted Images". Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/4313580.
Texto completoFuller, LaJuan Perronoski. "Foundational Leadership Theory: A New Ethical Approach to Reducing Knowledge-Hiding Practices Among Employees". International Journal of Social Science Studies 9, n.º 5 (3 de agosto de 2021): 67. http://dx.doi.org/10.11114/ijsss.v9i5.5286.
Texto completoPan, Ping, Junzhi Ye, Yun Pan, Lize Gu y Licheng Wang. "New Commitment Schemes Based on Conjugacy Problems over Rubik’s Groups". Information 12, n.º 8 (24 de julio de 2021): 294. http://dx.doi.org/10.3390/info12080294.
Texto completoGuo, Fang, Jia Yong Duan y Hao Jing. "Information Hiding Algorithm Based on Two m-Sequences". Advanced Materials Research 760-762 (septiembre de 2013): 2072–76. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2072.
Texto completoJournal, Baghdad Science. "Building a Reliable Steganography System Using Random Key in a spatial Domain of Image". Baghdad Science Journal 11, n.º 2 (1 de junio de 2014): 265–74. http://dx.doi.org/10.21123/bsj.11.2.265-274.
Texto completoYang, Yu Jun y Yi Mei Yang. "A Robust Webpage Information Hiding Method Based on the Slash of Tag". Advanced Engineering Forum 6-7 (septiembre de 2012): 361–66. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.361.
Texto completoMa, Wenyue, Xiaohua Wang y Yongjun Ren. "A new method of text information hiding based on open channel". International Journal of High Performance Computing and Networking 14, n.º 3 (2019): 325. http://dx.doi.org/10.1504/ijhpcn.2019.10023613.
Texto completoRen, Yongjun, Wenyue Ma y Xiaohua Wang. "A new method of text information hiding based on open channel". International Journal of High Performance Computing and Networking 14, n.º 3 (2019): 325. http://dx.doi.org/10.1504/ijhpcn.2019.102132.
Texto completoYan, Xuehu, Shen Wang, Ahmed A. Abd El-Latif y Xiamu Niu. "New approaches for efficient information hiding-based secret image sharing schemes". Signal, Image and Video Processing 9, n.º 3 (12 de abril de 2013): 499–510. http://dx.doi.org/10.1007/s11760-013-0465-y.
Texto completoWendzel, Steffen, Luca Caviglione, Wojciech Mazurczyk y Jean-Francois Lalande. "Network Information Hiding and Science 2.0: Can it be a Match?" International Journal of Electronics and Telecommunications 63, n.º 2 (27 de junio de 2017): 217–22. http://dx.doi.org/10.1515/eletel-2017-0029.
Texto completoAbu-Almash, Fadheela Sabri. "New Steganography System Based on Huffman Coding and Fibonacci Decomposition". Ibn AL- Haitham Journal For Pure and Applied Science 31, n.º 1 (10 de mayo de 2018): 231. http://dx.doi.org/10.30526/31.1.1831.
Texto completoG, Saranya. "An efficient data hiding method in images". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 6 (1 de diciembre de 2019): 4713. http://dx.doi.org/10.11591/ijece.v9i6.pp4713-4720.
Texto completoAsaad Zebari, Nichirvan, Dilovan Asaad Zebari, Diyar Qader Zeebaree y Jwan Najeeb Saeed. "Significant features for steganography techniques using deoxyribonucleic acid: a review". Indonesian Journal of Electrical Engineering and Computer Science 21, n.º 1 (1 de enero de 2021): 338. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp338-347.
Texto completoSoltani, Mohammad y Amid Khatibi Bardsiri. "A New Secure Hybrid Algorithm for QR-Code Images Encryption and Steganography". APTIKOM Journal on Computer Science and Information Technologies 2, n.º 2 (1 de julio de 2017): 86–96. http://dx.doi.org/10.11591/aptikom.j.csit.109.
Texto completoNtahobari, Maurice y Tohari Ahmad. "Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 4 (1 de agosto de 2018): 2468. http://dx.doi.org/10.11591/ijece.v8i4.pp2468-2476.
Texto completoUnno, Hiroshi, Ronnaporn Yamkum, Chutharat Bunporn y Kazutake Uehira. "A New Displaying Technology for Information Hiding Using Temporally Brightness Modulated Pattern". IEEE Transactions on Industry Applications 53, n.º 1 (enero de 2017): 596–601. http://dx.doi.org/10.1109/tia.2016.2604217.
Texto completoKhan, Sahib, Khalil Khan, Arslan Arif, Mahmoud Hassaballah, Jehad Ali, Qui Thanh Hoai Ta y Lisu Yu. "A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT". Symmetry 12, n.º 10 (12 de octubre de 2020): 1659. http://dx.doi.org/10.3390/sym12101659.
Texto completoMohan, S. Vijayarani y Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining". International Journal of Information Security and Privacy 12, n.º 3 (julio de 2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Texto completoGavinsky, Dmitry y Tsuyoshi Ito. "Quantum fingerprints that keep secrets". Quantum Information and Computation 13, n.º 7&8 (mayo de 2013): 583–606. http://dx.doi.org/10.26421/qic13.7-8-3.
Texto completoHossain, Safwan, Evi Micha y Nisarg Shah. "The Surprising Power of Hiding Information in Facility Location". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 02 (3 de abril de 2020): 2168–75. http://dx.doi.org/10.1609/aaai.v34i02.5592.
Texto completoTseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu y Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function". Security and Communication Networks 2021 (12 de febrero de 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.
Texto completoLin, Hui, Jie Lin y Bo Fu. "Information Hiding and Extracting in Printed Chinese Documents by Missing Feature Method". Advanced Materials Research 765-767 (septiembre de 2013): 1524–28. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1524.
Texto completoZhang, Zelin, Jian Xu, Bin Ma, Chunpeng Wang, Jian Li y Yuli Wang. "Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding". Security and Communication Networks 2021 (15 de julio de 2021): 1–11. http://dx.doi.org/10.1155/2021/5511806.
Texto completoT V S, Gowtham Prasad, Dr S. Varadarajan, Dr S. A. K. Jilani y Dr G. N. Kodandaramaiah. "Image Steganography Based On Optimal LSB Pixel Adjustment Method". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, n.º 1 (30 de mayo de 2013): 1–6. http://dx.doi.org/10.24297/ijct.v5i1.4380.
Texto completoChe, Sheng Bing, Dong Mei Guo, Ye Mao Wang y Li Li Pan. "A Software Watermarking Algorithm Based on Binder Technology". Applied Mechanics and Materials 687-691 (noviembre de 2014): 2971–74. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2971.
Texto completoChatterjee, Ayan y Nikhilesh Barik. "A New Data Hiding Scheme Using Laplace Transformation in Frequency Domain Steganography". International Journal of Hyperconnectivity and the Internet of Things 4, n.º 1 (enero de 2020): 1–12. http://dx.doi.org/10.4018/ijhiot.2020010101.
Texto completoAbbood, Elaf Ali, Rusul Mohammed Neamah y Shaymaa Abdulkadhm. "Text in Image Hiding using Developed LSB and Random Method". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 4 (1 de agosto de 2018): 2091. http://dx.doi.org/10.11591/ijece.v8i4.pp2091-2097.
Texto completoBanawan, Salma y Ibrahim Kamel. "Hiding Information in Reversible English Transforms for a Blind Receiver". Applied Computational Intelligence and Soft Computing 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/387985.
Texto completoChe, Sheng Bing y Hai Yang Wang. "A Fragile Information Hiding Technique Based on Human Visual Gray Sensitivity". Advanced Materials Research 121-122 (junio de 2010): 1048–51. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.1048.
Texto completoTiwari, Rajesh Kumar y G. Sahoo. "Microsoft Excel File". International Journal of Digital Crime and Forensics 3, n.º 1 (enero de 2011): 37–52. http://dx.doi.org/10.4018/jdcf.2011010103.
Texto completoHtet, May y Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets". Journal of Computer Science 2, n.º 1 (16 de julio de 2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.
Texto completoMukherjee, Subhadip y Biswapati Jana. "A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion". International Journal of Natural Computing Research 8, n.º 4 (octubre de 2019): 13–27. http://dx.doi.org/10.4018/ijncr.2019100102.
Texto completoNaman, Hala A., Naseer Ali Hussien, Mohand Lokman Al-dabag y Haider Th Salim Alrikabi. "Encryption System for Hiding Information Based on Internet of Things". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 02 (26 de enero de 2021): 172. http://dx.doi.org/10.3991/ijim.v15i02.19869.
Texto completoMaji, Giridhar, Sharmistha Mandal y Soumya Sen. "Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain". International Journal of Information Security and Privacy 14, n.º 2 (abril de 2020): 83–101. http://dx.doi.org/10.4018/ijisp.2020040105.
Texto completoWang, Eric Ke y Yun Ming Ye. "A New Text Based CAPTCHA". Applied Mechanics and Materials 373-375 (agosto de 2013): 644–49. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.644.
Texto completoZhou, Shi Hua, Qiang Zhang y Xiao Peng Wei. "Image Encryption Based on Genetic Engineering for Image Hiding". Applied Mechanics and Materials 20-23 (enero de 2010): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1247.
Texto completo