Siga este enlace para ver otros tipos de publicaciones sobre el tema: Information hiding (NEW).

Artículos de revistas sobre el tema "Information hiding (NEW)"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Information hiding (NEW)".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Siddik, Omer y Ersin Elbasi. "Information Hiding: A New Multi Watermark Algorithm Using Radon Transformation". International Journal of Information and Electronics Engineering 5, n.º 6 (2015): 460–63. http://dx.doi.org/10.7763/ijiee.2015.v5.579.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

A. Jalab, Hamid, A. A. Zaidan y B. B. Zaidan. "New Design for Information Hiding with in Steganography Using Distortion Techniques". International Journal of Engineering and Technology 2, n.º 1 (2010): 72–77. http://dx.doi.org/10.7763/ijet.2010.v2.103.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Mitekin, V. A. y V. A. Fedoseev. "NEW SECURE QIM-BASED INFORMATION HIDING ALGORITHMS". Computer Optics 42, n.º 1 (30 de marzo de 2018): 118–27. http://dx.doi.org/10.18287/2412-6179-2018-42-1-118-127.

Texto completo
Resumen
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between key bits and multimedia data samples. To obtain the required security, we use a correlation immune embedding function, which guarantees statistical independence between the watermarked data and the key. The proposed algorithms are described for the case of spatial embedding in images but the algorithms can also be used to hide information in any multimedia data source in spatio-temporal and spectral domains. The results of the experimental investigation have confirmed that the algorithms developed provide the required security against a statistical attack and also have shown that the algorithms do not introduce additional distortions compared with the conventional QIM method. However, the experiments have also shown that the new algorithms are less robust against additive noise and JPEG compression.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Zhang, Yi, Quan Zhou, Yan-lang Hu, Juan-ni Liu y Rui-hua Liu. "A new near-lossless image information hiding algorithm with controlled hiding capacity". Journal of Physics: Conference Series 2005, n.º 1 (1 de agosto de 2021): 012053. http://dx.doi.org/10.1088/1742-6596/2005/1/012053.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Mitekin, V. A. y V. A. Fedoseev. "A NEW ROBUST INFORMATION HIDING METHOD FOR VIDEO". Computer Optics 38, n.º 3 (1 de enero de 2014): 564–73. http://dx.doi.org/10.18287/0134-2452-2014-38-3-564-573.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

YUE, Qin y chen CHEN. "New secrete information hiding method for remote sensing images". Journal of Computer Applications 29, n.º 11 (28 de diciembre de 2009): 2977–79. http://dx.doi.org/10.3724/sp.j.1087.2009.02977.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Cabaj, Krzysztof, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward y Sebastian Zander. "The New Threats of Information Hiding: The Road Ahead". IT Professional 20, n.º 3 (mayo de 2018): 31–39. http://dx.doi.org/10.1109/mitp.2018.032501746.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Journal, Baghdad Science. "Optimal Color Model for Information Hidingin Color Images". Baghdad Science Journal 5, n.º 4 (7 de diciembre de 2008): 686–92. http://dx.doi.org/10.21123/bsj.5.4.686-692.

Texto completo
Resumen
In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Parah, Shabir A., Farhana Ahad, Javaid A. Sheikh y G. M. Bhat. "Hiding clinical information in medical images: A new high capacity and reversible data hiding technique". Journal of Biomedical Informatics 66 (febrero de 2017): 214–30. http://dx.doi.org/10.1016/j.jbi.2017.01.006.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wang, Xiao Feng. "Study on the Technology of Information Hiding Based on HTML Tags". Advanced Materials Research 798-799 (septiembre de 2013): 423–26. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.423.

Texto completo
Resumen
Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Szczypiorski, Krzysztof. "StegHash: New Method for Information Hiding in Open Social Networks". International Journal of Electronics and Telecommunications 62, n.º 4 (1 de diciembre de 2016): 347–52. http://dx.doi.org/10.1515/eletel-2016-0048.

Texto completo
Resumen
Abstract In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sun, Shuliang. "A New Information Hiding Method Based on Improved BPCS Steganography". Advances in Multimedia 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/698492.

Texto completo
Resumen
Bit-plane complexity segmentation (BPCS) steganography is advantageous in its capacity and imperceptibility. The important step of BPCS steganography is how to locate noisy regions in a cover image exactly. The regular method, black-and-white border complexity, is a simple and easy way, but it is not always useful, especially for periodical patterns. Run-length irregularity and border noisiness are introduced in this paper to work out this problem. Canonical Cray coding (CGC) is also used to replace pure binary coding (PBC), because CGC makes use of characteristic of human vision system. Conjugation operation is applied to convert simple blocks into complex ones. In order to contradict BPCS steganalysis, improved BPCS steganography algorithm adopted different bit-planes with different complexity. The higher the bit-plane is, the smaller the complexity is. It is proven that the improved BPCS steganography is superior to BPCS steganography by experiment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Awad, Wasan Shaker. "Information Hiding Using Ant Colony Optimization Algorithm". International Journal of Technology Diffusion 2, n.º 1 (enero de 2011): 16–28. http://dx.doi.org/10.4018/jtd.2011010102.

Texto completo
Resumen
This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the optimal set of the image pixel bits to be substituted by the secret message bits, such that the cover image is of high quality, is a complex process and there is an exponential number of feasible solutions. Two new ant-based algorithms are proposed and compared with other algorithms. The experimental results show that ant colony optimization algorithm can find the solution efficiently and effectively by finding the optimal set of pixel bits in a few number of iterations and with least Mean Square Error (MSE) comparable with genetic and genetic simulated annealing algorithms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Kim, Ki-Jong, Sang-Ho Shin y Kee-Young Yoo. "A New Information Data Hiding Scheme based on Pattern Information of Secret Data". Journal of Korea Multimedia Society 15, n.º 4 (30 de abril de 2012): 526–39. http://dx.doi.org/10.9717/kmms.2012.15.4.526.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Cao, Laicheng y Hao Zhou. "A New Reversible Date-Hiding Algorithm for Encrypted Images". Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/4313580.

Texto completo
Resumen
In order to effectively increase embedding capacity and completely extract the watermarking information in information hiding of encrypted images, a new reversible watermarking embedding algorithm based on rhombus prediction model and difference histogram shifting ideas is proposed. Firstly, the images are pretreated according to rhombus prediction model. Then, the watermarking information is embedded in encrypted images by effective combination of homomorphism encryption scheme and reversible watermarking techniques. Finally, the watermarking information is completely extracted and the images are recovered based on computed difference histogram from left to right and from top to bottom. So, the efficiency and reversibility are ensured when watermarking information is embedded in encrypted image. Experiment results show that the proposed algorithm is simple and easy to realize, the embedding capacity is effectively increased, watermarking information is completely reversible, and the image can be recovered with no distortion.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Fuller, LaJuan Perronoski. "Foundational Leadership Theory: A New Ethical Approach to Reducing Knowledge-Hiding Practices Among Employees". International Journal of Social Science Studies 9, n.º 5 (3 de agosto de 2021): 67. http://dx.doi.org/10.11114/ijsss.v9i5.5286.

Texto completo
Resumen
Knowledge hiding is a destructive behavior that degrades organizational success. Knowledge hiding is the intentional withholding of information from another employee. It has been reported that 76% of U.S. employees hide knowledge from each other. The displaced aggression theory suggests that employees are more likely to hide knowledge from others in the presence of mistreatment by a leader. Therefore, there was a need to investigate new ethical theories that have been shown to influence organizational commitment and potentially decrease knowledge-hiding practices among employees. This research used foundational leadership theory (FLT) developed by Fuller in 2021 to examine the overall influence on knowledge hiding. The sample consisted of 306 full-time employees across various industries throughout the United States. The results indicated that FLT had a significant negative relationship (-0.64); regression analysis indicated that, as FLT increased, knowledge hiding decreased by 0.57. Therefore, leadership training programs that teach ethical leaders based on integrity, assurance, and pragmatism will likely reduce knowledge hiding tactics among employees and create a strategic advantage among competitors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Pan, Ping, Junzhi Ye, Yun Pan, Lize Gu y Licheng Wang. "New Commitment Schemes Based on Conjugacy Problems over Rubik’s Groups". Information 12, n.º 8 (24 de julio de 2021): 294. http://dx.doi.org/10.3390/info12080294.

Texto completo
Resumen
Commitment schemes are important tools in cryptography and used as building blocks in many cryptographic protocols. We propose two commitment schemes by using Rubik’s groups. Our proposals do not lay the security on the taken-for-granted hardness of the word problem over Rubik’s groups. Instead, our first proposal is based on a symmetric encryption algorithm that is secure based on the hardness of the conjugacy search problem over Rubik’s groups, while our second proposal is based on the hardness of a newly derived problem—the functional towering conjugacy search problem over Rubik’s groups. The former is proved secure in the sense of both computational hiding and binding, while the latter is proved even secure in the sense of perfect hiding and computational binding. Furthermore, the proposed schemes have a remarkable performance advantage: a linear commitment/opening speed. We also evaluate the efficiency of the commitment schemes and show that they are considerably fast.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Guo, Fang, Jia Yong Duan y Hao Jing. "Information Hiding Algorithm Based on Two m-Sequences". Advanced Materials Research 760-762 (septiembre de 2013): 2072–76. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2072.

Texto completo
Resumen
According to the problem that the intelligence is not high of the soccer robot, using the mechanical theory as a guide, making some mechanical analyses and calculations on the pressure and transmutation states of chip kick mechanics, and conducting optimal design too, then making the structure of chip kick mechanics more and more rationalization. Experiments show that the new soccer robot controller features a quick response and high servo rigidity, and provide a kind of method for improving and perfecting the soccer robot control system, at the same time, filling the needs of producing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Journal, Baghdad Science. "Building a Reliable Steganography System Using Random Key in a spatial Domain of Image". Baghdad Science Journal 11, n.º 2 (1 de junio de 2014): 265–74. http://dx.doi.org/10.21123/bsj.11.2.265-274.

Texto completo
Resumen
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and in practice, through example.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Yang, Yu Jun y Yi Mei Yang. "A Robust Webpage Information Hiding Method Based on the Slash of Tag". Advanced Engineering Forum 6-7 (septiembre de 2012): 361–66. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.361.

Texto completo
Resumen
Nowadays,the information hiding technology is a hot spot in the field of information security, and is applied in many fields,such as digital multimedia copyright protection and secret communication. According to the analysis of the characteristics of browser in parsing HTML of the webpage and the little capacity available for information hided in webpage, a new robust webpage information hiding method with the slash of tag attributes has been proposed in this paper, which overcomes the shortcoming of the ability of imperceptibility and the ability of contradict with the machine filtration of traditional webpage information hiding algorithms and has greater embedded capacity than some other algorithm based on tag attributes. This method has good performances in invisibility and higher applied value as proved by the experiments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Ma, Wenyue, Xiaohua Wang y Yongjun Ren. "A new method of text information hiding based on open channel". International Journal of High Performance Computing and Networking 14, n.º 3 (2019): 325. http://dx.doi.org/10.1504/ijhpcn.2019.10023613.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Ren, Yongjun, Wenyue Ma y Xiaohua Wang. "A new method of text information hiding based on open channel". International Journal of High Performance Computing and Networking 14, n.º 3 (2019): 325. http://dx.doi.org/10.1504/ijhpcn.2019.102132.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Yan, Xuehu, Shen Wang, Ahmed A. Abd El-Latif y Xiamu Niu. "New approaches for efficient information hiding-based secret image sharing schemes". Signal, Image and Video Processing 9, n.º 3 (12 de abril de 2013): 499–510. http://dx.doi.org/10.1007/s11760-013-0465-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Wendzel, Steffen, Luca Caviglione, Wojciech Mazurczyk y Jean-Francois Lalande. "Network Information Hiding and Science 2.0: Can it be a Match?" International Journal of Electronics and Telecommunications 63, n.º 2 (27 de junio de 2017): 217–22. http://dx.doi.org/10.1515/eletel-2017-0029.

Texto completo
Resumen
Abstract Science 2.0 aims at using the information sharing and collaborative features of the Internet to offer new features to the research community. Science 2.0 has been already applied to computer sciences, especially bioinformatics. For network information hiding, a field studying the possibility of concealing a communication in networks, the application of Science 2.0 is still a rather uncovered territory. To foster the discussion of potential benefits for network information hiding, we provide a disquisition for six different Science 2.0 aspects when applied to this domain.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Abu-Almash, Fadheela Sabri. "New Steganography System Based on Huffman Coding and Fibonacci Decomposition". Ibn AL- Haitham Journal For Pure and Applied Science 31, n.º 1 (10 de mayo de 2018): 231. http://dx.doi.org/10.30526/31.1.1831.

Texto completo
Resumen
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

G, Saranya. "An efficient data hiding method in images". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 6 (1 de diciembre de 2019): 4713. http://dx.doi.org/10.11591/ijece.v9i6.pp4713-4720.

Texto completo
Resumen
<p class="Abstract">Data Hiding has a huge range of applications in the medical field for transmission. It is helpful in securing the documentation of the patients from the violator with good storage space. The medical images of different modalities like CT, MRI, and PET with the digitized clinical information can be sent to the doctors across the world for the treatment. Due to the bandwidth and storage constraints, medical images along with the clinical information must be compressed before transmission and storage. This paper gives a technique for hiding the digitized clinical information along with the DICOM images in Complex Contourlet Transform (CCT) Domain. It also analyses the compression method by using an Entropy Encoder method. Hence, this work suggests that the data hiding method based on Complex Contourlet Transform (CCT) is efficient and also it has a high hiding capacity. The improved value of Compression Ratio (CR), Space Saving (SS), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) shows that the new method satisfies the properties of the data hiding method.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Asaad Zebari, Nichirvan, Dilovan Asaad Zebari, Diyar Qader Zeebaree y Jwan Najeeb Saeed. "Significant features for steganography techniques using deoxyribonucleic acid: a review". Indonesian Journal of Electrical Engineering and Computer Science 21, n.º 1 (1 de enero de 2021): 338. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp338-347.

Texto completo
Resumen
<p><span>Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this willbe helpful. </span></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Soltani, Mohammad y Amid Khatibi Bardsiri. "A New Secure Hybrid Algorithm for QR-Code Images Encryption and Steganography". APTIKOM Journal on Computer Science and Information Technologies 2, n.º 2 (1 de julio de 2017): 86–96. http://dx.doi.org/10.11591/aptikom.j.csit.109.

Texto completo
Resumen
Encryption is a method, for the protection of useful information, which is used as one of the security purposes and steganography is the art of hiding the fact that communication is taking place, by hiding information in other Information. In this article at first, plain text message as a security information is converted to the (Quick Response Code) QR-code image and then we proposed a new secure hybrid algorithm for the encryption and steganography of generated QR-code. In this article image encryption is based on two-dimensional logistic chaotic map and AES algorithm and steganography technique is based on LSB algorithm. In addition, Huffman algorithm has come out as the most efficient compression technique and we can use Huffman algorithm to compress encrypted QR-code. Experimental results show that the scheme proposed in this article has a high security and better QR-Code images encryption and steganography quality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Ntahobari, Maurice y Tohari Ahmad. "Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 4 (1 de agosto de 2018): 2468. http://dx.doi.org/10.11591/ijece.v8i4.pp2468-2476.

Texto completo
Resumen
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Unno, Hiroshi, Ronnaporn Yamkum, Chutharat Bunporn y Kazutake Uehira. "A New Displaying Technology for Information Hiding Using Temporally Brightness Modulated Pattern". IEEE Transactions on Industry Applications 53, n.º 1 (enero de 2017): 596–601. http://dx.doi.org/10.1109/tia.2016.2604217.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Khan, Sahib, Khalil Khan, Arslan Arif, Mahmoud Hassaballah, Jehad Ali, Qui Thanh Hoai Ta y Lisu Yu. "A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT". Symmetry 12, n.º 10 (12 de octubre de 2020): 1659. http://dx.doi.org/10.3390/sym12101659.

Texto completo
Resumen
This work presents a new asymmetric data hiding technique that hides a variable number of secret message bits in the discrete cosine transform (DCT) coefficients of a cover image using a modular distance technique. Prior to data hiding, the proposed framework transforms a cover image from a spatial domain to various frequency coefficients using DCT. The DCT coefficients are arranged in two groups: one with low-frequency coefficient, and the other with the medium and high-frequency coefficients. The medium and higher frequency coefficients are processed for variable data hiding asymmetrically. The proposed technique hides variable sets of secret information bits in different coefficients. The variation in hidden secret information is maintained using a key developed based on the modulo of distance of a coefficient from the reference point. The same key is also used to retrieve the confidential information at the receiver ends. The results reveal that the presented framework does not create any visually significant distortion, and thus the hidden information does not attract the human visual system (HVS). The technique also results in high data hiding efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Mohan, S. Vijayarani y Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining". International Journal of Information Security and Privacy 12, n.º 3 (julio de 2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.

Texto completo
Resumen
This article describes how privacy preserving data mining has become one of the most important and interesting research directions in data mining. With the help of data mining techniques, people can extract hidden information and discover patterns and relationships between the data items. In most of the situations, the extracted knowledge contains sensitive information about individuals and organizations. Moreover, this sensitive information can be misused for various purposes which violate the individual's privacy. Association rules frequently predetermine significant target marketing information about a business. Significant association rules provide knowledge to the data miner as they effectively summarize the data, while uncovering any hidden relations among items that hold in the data. Association rule hiding techniques are used for protecting the knowledge extracted by the sensitive association rules during the process of association rule mining. Association rule hiding refers to the process of modifying the original database in such a way that certain sensitive association rules disappear without seriously affecting the data and the non-sensitive rules. In this article, two new hiding techniques are proposed namely hiding technique based on genetic algorithm (HGA) and dummy items creation (DIC) technique. Hiding technique based on genetic algorithm is used for hiding sensitive association rules and the dummy items creation technique hides the sensitive rules as well as it creates dummy items for the modified sensitive items. Experimental results show the performance of the proposed techniques.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Gavinsky, Dmitry y Tsuyoshi Ito. "Quantum fingerprints that keep secrets". Quantum Information and Computation 13, n.º 7&8 (mayo de 2013): 583–606. http://dx.doi.org/10.26421/qic13.7-8-3.

Texto completo
Resumen
We introduce a new type of cryptographic primitive that we call a \e{hiding fingerprinting scheme}. A (quantum) fingerprinting scheme maps a binary string of length $n$ to $d$ (qu)bits, typically $d\ll n$, such that given any string $y$ and a fingerprint of $x$, one can decide with high accuracy whether $x=y$. It can be seen that a classical fingerprint of $x$ that guarantees error $\le\eps$ necessarily reveals \asOm{\Min{n,\log(1/\eps)}} bits of information about $x$. We call a scheme \e{hiding} if it reveals \aso{\Min{n,\log(1/\eps)}} bits; accordingly, no classical scheme is hiding. }{We construct quantum hiding fingerprinting schemes. Our schemes are computationally efficient and their hiding properties are shown to be optimal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Hossain, Safwan, Evi Micha y Nisarg Shah. "The Surprising Power of Hiding Information in Facility Location". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 02 (3 de abril de 2020): 2168–75. http://dx.doi.org/10.1609/aaai.v34i02.5592.

Texto completo
Resumen
Facility location is the problem of locating a public facility based on the preferences of multiple agents. In the classic framework, where each agent holds a single location on a line and can misreport it, strategyproof mechanisms for choosing the location of the facility are well-understood.We revisit this problem in a more general framework. We assume that each agent may hold several locations on the line with different degrees of importance to the agent. We study mechanisms which elicit the locations of the agents and different levels of information about their importance. Further, in addition to the classic manipulation of misreporting locations, we introduce and study a new manipulation, whereby agents may hide some of their locations. We argue for its novelty in facility location and applicability in practice. Our results provide a complete picture of the power of strategyproof mechanisms eliciting different levels of information and with respect to each type of manipulation. Surprisingly, we show that in some cases hiding locations can be a strictly more powerful manipulation than misreporting locations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Tseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu y Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function". Security and Communication Networks 2021 (12 de febrero de 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.

Texto completo
Resumen
Predicate encryption (PE), formalized by Katz et al., is a new paradigm of public-key encryption that conceptually captures the public-key encryption that supports fine-grained access control policy. Because of the nature of PE, it is used for cloud storage so that users can retrieve encrypted data without revealing any information about the data to cloud servers and other users. Although lots of PE schemes have been studied, the predicate-hiding security is seldom considered; that is, the user’s secret key may leak sensitive information of the predicate. Additionally, the security of the current predicate-hiding PE schemes relies on the discrete logarithm assumption which cannot resist the quantum attacks in the future. In this paper, we propose a generic PE for inner product under symmetric-key setting, called private IPE, from specific key-homomorphic pseudorandom function (PRF). The rigorous proofs are provided to show that the construction is payload-hiding, attribute-hiding, and predicate-hiding secure. With the advantage of the generic construction, if the underlying PRF can resist quantum attacks, then, through our proposed generic construction, a quantum-resistant private IPE can be obtained.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Lin, Hui, Jie Lin y Bo Fu. "Information Hiding and Extracting in Printed Chinese Documents by Missing Feature Method". Advanced Materials Research 765-767 (septiembre de 2013): 1524–28. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1524.

Texto completo
Resumen
In this paper, we proposed a new method for hiding and extracting information in printed chinese documents. This new method embeds information into chinese documents by varying the typefaces of chinese words. In addition, an information extracting method based on missing feature concepts is proposed to handle the partial occlusion, generated by printing and scanning operations. The new improved approach has been evaluated on numerous printed documents and demonstrated improved performance over other systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Zhang, Zelin, Jian Xu, Bin Ma, Chunpeng Wang, Jian Li y Yuli Wang. "Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding". Security and Communication Networks 2021 (15 de julio de 2021): 1–11. http://dx.doi.org/10.1155/2021/5511806.

Texto completo
Resumen
Medical image data, like most patient information, has high requirements for privacy and confidentiality. To improve the security of medical image transmission within the open network, we proposed a medical image key area protection algorithm based on reversible data hiding. First, the coefficient of variation is used to identify the key area, that is, the lesion area of the image. Then, the other regions are divided into blocks to analyze the texture complexity. Next, we propose a new reversible data hiding algorithm, which embeds the content of the key area into the high-texture regions. On this basis, a quick response (QR) code is generated using the ciphertext of the basic image information to replace the original lesion area. Experimental results show that this method can not only safely transmit sensitive patient information by hiding the content of the lesion, it can also store copyright information through QR code and achieve accurate image retrieval.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

T V S, Gowtham Prasad, Dr S. Varadarajan, Dr S. A. K. Jilani y Dr G. N. Kodandaramaiah. "Image Steganography Based On Optimal LSB Pixel Adjustment Method". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, n.º 1 (30 de mayo de 2013): 1–6. http://dx.doi.org/10.24297/ijct.v5i1.4380.

Texto completo
Resumen
Now a days, internet becomes major channel for communicating information one place to other such as text, image, audio, video data. Steganography is a technique in which information can to be communicating secretly by hiding in another such as secondary information with changing its significance. This paper presents a new approach of image steganography using polynomial based optimal LSB and pixel adjustment method. This method main focus on adaptiveness of LSB’s replacement and pixel adjustment for improving the capacity of hiding data and robustness of steganography. Objective analysis is done over the proposed method using MSE, PSNR and Normalized correlation method.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Che, Sheng Bing, Dong Mei Guo, Ye Mao Wang y Li Li Pan. "A Software Watermarking Algorithm Based on Binder Technology". Applied Mechanics and Materials 687-691 (noviembre de 2014): 2971–74. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2971.

Texto completo
Resumen
Information hiding in a resources section’s redundancies has large amount of watermark embedding, and the software watermarking based on PE file resources section format has high concealment. This paper combined this two algorithms’ advantages, and embedded the watermark information in these two ways. It also introduced the information hiding technology based on ICON file and binder technology to realize the tamper-proof function of the watermark. Experiments shows that this scheme not only improves the embedded information capacity, but also overcomes the problem that the embedded watermark are susceptible to tamper-proof attack. So the new scheme improves the watermark’s comprehensive performance, and create a more secure and robust software watermark.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Chatterjee, Ayan y Nikhilesh Barik. "A New Data Hiding Scheme Using Laplace Transformation in Frequency Domain Steganography". International Journal of Hyperconnectivity and the Internet of Things 4, n.º 1 (enero de 2020): 1–12. http://dx.doi.org/10.4018/ijhiot.2020010101.

Texto completo
Resumen
Today, in the age of wireless communication, network security is an important issue. Image steganography is a popular approach to make communication secure. Among two categories (spatial domain and frequency domain) of image steganography, frequency domain is more secured than the spatial domain. The proposed scheme develops a secret communication technique in frequency domain steganography. In steganography, the concept of Laplace transformation is used during embedding and extraction procedures of secret information in image files. As a result, all the conditions of information security are developed in high density. The efficiency and effectiveness of the scheme is evaluated by measuring the hacking chance from different statistical attacks by RS steganalysis and originality of actual cover image after inserting secret information by Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR).
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Abbood, Elaf Ali, Rusul Mohammed Neamah y Shaymaa Abdulkadhm. "Text in Image Hiding using Developed LSB and Random Method". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 4 (1 de agosto de 2018): 2091. http://dx.doi.org/10.11591/ijece.v8i4.pp2091-2097.

Texto completo
Resumen
<p><span>Information Hiding is a task that face difficult challenges in current time. <br /> The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.</span></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Banawan, Salma y Ibrahim Kamel. "Hiding Information in Reversible English Transforms for a Blind Receiver". Applied Computational Intelligence and Soft Computing 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/387985.

Texto completo
Resumen
This paper proposes a new technique for hiding secret messages in ordinary English text. The proposed technique exploits the redundancies existing in some English language constructs. Redundancies result from the flexibility in maneuvering certain statement constituents without altering the statement meaning or correctness. For example, one can say “she went to sleep, because she was tired” or “Because she was tired, she went to sleep.” The paper provides a number of such transformations that can be applied concurrently, while keeping the overall meaning and grammar intact. The proposed data hiding technique is blind since the receiver does not keep a copy of the original uncoded text (cover). Moreover, it can hide more than three bits per statement, which is higher than that achieved in the prior work. A secret key that is a function of the various transformations used is proposed to protect the confidentiality of the hidden message. Our security analysis shows that even if the attacker knows how the transforms are employed, the secret key provides enough security to protect the confidentiality of the hidden message. Moreover, we show that the proposed transformations do not affect the inconspicuousness of the transformed statements, and thus unlikely to draw suspicion.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Che, Sheng Bing y Hai Yang Wang. "A Fragile Information Hiding Technique Based on Human Visual Gray Sensitivity". Advanced Materials Research 121-122 (junio de 2010): 1048–51. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.1048.

Texto completo
Resumen
Based on human visual gray sensitivity, a fragile large capacity spatial domain information hiding algorithm, and a new calculation formula of image peak signal-to-noise ratio were put forward. An adaptive embedding method was proposed, which had the minimum visual gray sensitivity when massive information were hidden into an original image. Experiments showed that this algorithm had massive amount of embedded information and excellent masking properties, and what’s more, once there is a bit tampered randomly, the watermarking image could not be recovered correctly. So it was suitable for the situation where the received information must be very strict reliably.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Tiwari, Rajesh Kumar y G. Sahoo. "Microsoft Excel File". International Journal of Digital Crime and Forensics 3, n.º 1 (enero de 2011): 37–52. http://dx.doi.org/10.4018/jdcf.2011010103.

Texto completo
Resumen
Data hiding is emerging as an important area of research with the advent of digital technologies. Watermarking, fingerprinting and steganography are important applications of data hiding techniques. Besides the classical use of data hiding in ownership protection, authentication and copy/access control, it serves as a general tool to convey side information. New files are a good choice for steganographic carriers. In this paper, the authors use Microsoft Excel as a cover file. A methodology has been developed that consists of three techniques for embedding the valuable data with three layers of security and high robustness. The resultant stego Excel file can be transmitted anywhere using any channel. Experimental results show the feasibility of the proposed methodology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Htet, May y Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets". Journal of Computer Science 2, n.º 1 (16 de julio de 2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.

Texto completo
Resumen
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Mukherjee, Subhadip y Biswapati Jana. "A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion". International Journal of Natural Computing Research 8, n.º 4 (octubre de 2019): 13–27. http://dx.doi.org/10.4018/ijncr.2019100102.

Texto completo
Resumen
Data hiding techniques are very significant in the research area of information security. In this article, the authors propose a new reversible data hiding (RDH) scheme using difference expansion. At first, the original image is partitioned into 3 × 3 pixel blocks, then marked Type-one and Type-two pixels based on their coordinate values. After that, the authors find correlated pixels by computing correlation coefficients and the median of Type-one pixels. Next, secret data bits are embedded within Type-two pixels based on correlated pixels and Type-one pixels based on the stego Type-two pixels. The data extraction process successfully extracts secret data as well as recovers the cover image. The authors observed the effects of the proposed method by performing experiments on some standard cover images and found significantly better result in terms of data hiding capacity compared with existing data hiding schemes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Naman, Hala A., Naseer Ali Hussien, Mohand Lokman Al-dabag y Haider Th Salim Alrikabi. "Encryption System for Hiding Information Based on Internet of Things". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 02 (26 de enero de 2021): 172. http://dx.doi.org/10.3991/ijim.v15i02.19869.

Texto completo
Resumen
<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Maji, Giridhar, Sharmistha Mandal y Soumya Sen. "Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain". International Journal of Information Security and Privacy 14, n.º 2 (abril de 2020): 83–101. http://dx.doi.org/10.4018/ijisp.2020040105.

Texto completo
Resumen
In the modern digital era, the privacy of personal communication is a serious concern to all netizens. A better way to preserve privacy could be to hide the secret message inside some innocent looking digital object such as image, audio, video, etc., which is known as steganography. A new steganographic scheme using a reference image along with the cover image has been proposed in this article. It enhances the robustness and security by increasing the obscurity of the hidden message. It also employs an additional dictionary-based encoding module to increase the hiding capacity as well as security. Experiments show that bit changes in the reference image are very few and undetectable to human perception, it also evades common statistical tests. Evaluation of standard quality parameters such as MSE, PSNR, UIQI, SSIM along with chi-squared statistics based embedding probability testing has been performed. When dictionary-based encoding is applied it further improves the quality parameters.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Wang, Eric Ke y Yun Ming Ye. "A New Text Based CAPTCHA". Applied Mechanics and Materials 373-375 (agosto de 2013): 644–49. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.644.

Texto completo
Resumen
Attacks on text-based CAPTCHAs are getting more sophisticated. Most existing schemes defend attacks by increasing deformation or distortion rate of words which sacrifice the friendliness of the system. In this paper, we propose a secure one time text-based CAPTCHA scheme which can effectively defend multiple attacks without decreasing the friendliness of the scheme for valid users. The core of our design is an information obfuscation scheme which determines which character image to display and which to hide in an online manner from a sequence of 62 character images which makes it more difficult to attack. Encryption method is employed for protecting display policies which control showing and hiding of information. Prototype has been implemented and the preliminary results are encouraging.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Zhou, Shi Hua, Qiang Zhang y Xiao Peng Wei. "Image Encryption Based on Genetic Engineering for Image Hiding". Applied Mechanics and Materials 20-23 (enero de 2010): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1247.

Texto completo
Resumen
Image encryption is one of the most important methods of image information hiding. A new image encryption method based on some techniques and knowledge of genetic engineering for image hiding is presented in this paper. This method is implemented by using modern biological techniques as tools and biological hard problems as main security basis to fully exert the special advantages. The keys are some substances of biological materials such as restriction endonuclease, polymerase and so on, the preparation flow and the experimental conditions. The analysis demonstrates that the image encryption algorithm is feasible and highly secure. Moreover, the size of the decrypted image is the same as the original image so that it can be applied for image hiding and be transmitted via the Internet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía