• Nenhum resultado encontrado

[PDF] Top 20 Hiding Data in Images Using New Random Technique

Has 10000 "Hiding Data in Images Using New Random Technique" found on our website. Below are the top 20 most common "Hiding Data in Images Using New Random Technique".

Hiding Data in Images Using New Random Technique

Hiding Data in Images Using New Random Technique

... of hiding the fact that communication is taking place by hiding information in other ...information. In the field of Data Communication, Steganography play a major ...information ... See full document

5

An Investigation into Encrypted Message Hiding Through Images Using LSB

An Investigation into Encrypted Message Hiding Through Images Using LSB

... a new framework of data hiding is presented which aimed to hide information ( a data file) in any execution (EXE) ...employed in this paper is Advanced Encryption Standard ... See full document

13

A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

... produced in random transformation phase is embedded into another image and finally file hybridization is done before transmitting to the ...step in the embedding phase is selecting the container ... See full document

12

Non-blind Data hiding for RGB images using DCT-based fusion and H.264 compression concepts

Non-blind Data hiding for RGB images using DCT-based fusion and H.264 compression concepts

... secure data communication. In this paper, a non-blind data hiding technique is proposed which is based on data fusion between both the cover and the secret ...made in the ... See full document

7

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE

... present in the image is used for performing ...a random selection of pixels. This technique shows how a selection of different portions of the images increased the chances of hiding ... See full document

15

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

... encrypted data that can be used for transmitting the Galois encrypted ...encrypted data is decoded using the Galois decoder ...pseudo random algorithms used at the Galois transmitter side are ... See full document

6

NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE

NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE

... video, images, and text are examples of real time applications that need to be transmitted quickly with a high level of ...the data during its transmit from sender to receiver by changing the situation of ... See full document

7

Radiometric Correction of Multitemporal Satellite Imagery

Radiometric Correction of Multitemporal Satellite Imagery

... confounded in terms of radiometric consistency due to changes in sensor calibration over time, differences in illumination, observation angles and variation in atmospheric ...satellite ... See full document

10

A Lossless Data Hiding Technique based on AES-DWT

A Lossless Data Hiding Technique based on AES-DWT

... a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale ...steganography ... See full document

9

A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value

A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value

... Data Hiding or Steganography offers an essential alternative to image integrity and authenticity ...of data hiding technique that provides another way of security protection for digital ... See full document

6

An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT

An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT

... ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- In the recent trend steganography plays an important role in ... See full document

4

A Technique to improve Security of Data in Multilevel Trust

A Technique to improve Security of Data in Multilevel Trust

... specific data. This proposed network system is useful in the medical ...used in research studies by analyzing the patients’ habits of life, epoch and obesity condition to predict their lifetime and ... See full document

4

Three-dimensional spectral-domain optical coherence tomography data analysis for glaucoma detection.

Three-dimensional spectral-domain optical coherence tomography data analysis for glaucoma detection.

... 2SD in most OCT devices, this new setting is more sensitive to identify the case at the border of the normative database, which might be an indicator of the structural changes at the early ...this ... See full document

10

The Efficiency Level in the Estimation of the Nigerian Population: A Comparison of One-Stage and Two-Stage Sampling Technique (A Case Study of the 2006 Census of Nigerians)

The Efficiency Level in the Estimation of the Nigerian Population: A Comparison of One-Stage and Two-Stage Sampling Technique (A Case Study of the 2006 Census of Nigerians)

... sampling in two stages namely first stage sampling (primary sampling unit) and the second stage sampling(second sampling ...taken in two ...observed in the previous ... See full document

9

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

... analyzing data from different point of views. This knowledge is expressed in decision trees, clusters or association ...task in data mining. By discovering interesting association rules ... See full document

7

Meniscal tears: comparison of the conventional spin-echo and fast spin-echo techniques through image processing

Meniscal tears: comparison of the conventional spin-echo and fast spin-echo techniques through image processing

... diagnostic images were obtained using the proton density conventional spin-echo (PD-CSE) technique with fat ...pioneering technique for detecting meniscal tears and was consid- ered to be a ... See full document

8

Estimating Energy Conservation Potential Of Local Metal Casting Units In Uganda Using Data Envelopment Analysis

Estimating Energy Conservation Potential Of Local Metal Casting Units In Uganda Using Data Envelopment Analysis

... improvement in foundries can have both firm level as well as macro economy level ...expenditure in order to remain competitive which is crucial for their survival and growth as these energy sources are ... See full document

7

AN IMAGE-BASED TECHNIQUE FOR 3D BUILDING RECONSTRUCTION USING MULTI-VIEW UAV IMAGES

AN IMAGE-BASED TECHNIQUE FOR 3D BUILDING RECONSTRUCTION USING MULTI-VIEW UAV IMAGES

... pixels in all of images. The effective way to find matched points in different views is to employ epipolar rectification (Zhang, ...1994). In epipolar rectification, all of the images ... See full document

4

Luiz Roberto Guimarães Guilherme1 , Fatima Maria de Souza Moreira1 , Nilton Curi1

Luiz Roberto Guimarães Guilherme1 , Fatima Maria de Souza Moreira1 , Nilton Curi1

... A determinação de atributos do solo auxilia no correto manejo da sua fertilidade. O equipamento portátil de fluorescência de raios-X (pXRF) foi recentemente adotado para determinar o teor total de elementos químicos em ... See full document

17

Generating Representative Sets and Summaries for Large Collection of Images Using Image Cropping Techniques and Result Comparison

Generating Representative Sets and Summaries for Large Collection of Images Using Image Cropping Techniques and Result Comparison

... the data set is defined. The data set is of 1000 holiday images (ordinary 2D high quality images) taken from INRIA holidays data-set 1 ...contains images without any ...and ... See full document

9

Show all 10000 documents...