• Nenhum resultado encontrado

[PDF] Top 20 A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key

Has 10000 "A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key" found on our website. Below are the top 20 most common "A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key".

A Novel Approach for Image Steganography Using Dynamic  Substitution and Secret Key

A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key

... Image steganography takes the advantage of limited power of human visual system ...an image, only the complex parts of the image holds added ...the image that will attract less ... See full document

9

An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT

An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT

... a novel data hiding scheme that hides data into the integer wavelet coefficients of an ...technique and the optimum pixel adjustment algorithm to increase the hiding capacity of the system compared to other ... See full document

4

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

... based image encryption scheme using a key of 128-bit ...algorithm, image is partitioned into several key based dynamic blocks and each block is passed through the eight ... See full document

12

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

... rearrangement image are very obligated for protection, compression, saving, gaming, and testing of ...new approach of digital image encryption is proposed based on the solution of low order ... See full document

6

Color Sensitivity Multiple Exposure Fusion using High Dynamic  Range Image

Color Sensitivity Multiple Exposure Fusion using High Dynamic Range Image

... region. Image processing system should be possible to apply specific image processing operations to selected ...an image (region) might be ... See full document

3

Multimodal emotion recognition

Multimodal emotion recognition

... recognize and distinguish between their fellow´s ...particular and distinguishable visible features of a ...(HCI) using natural ...gesture and even full body gesture [2] (to emphasize certain ... See full document

71

A Novel Approach for Inflation Analysis Using Hidden Markov Model

A Novel Approach for Inflation Analysis Using Hidden Markov Model

... recessions), and encouraging investment in non- monetary capital ...inflation and hyperinflation are caused by an excessive growth of the money ...goods and services, or changes in available supplies ... See full document

5

A Novel Algorithm for Watermarking and Image Encryption

A Novel Algorithm for Watermarking and Image Encryption

... transform and singular value decomposition. The paper also proposes a novel encryption algorithm to store a signed double matrix as an RGB ...watermarked image and correlation coefficient of ... See full document

10

A Novel Content-Based Image Retrieval Technique Using Tree Matching

A Novel Content-Based Image Retrieval Technique Using Tree Matching

... viewpoints and it is almost impossible to describe even a few subjects in an image just by small number of ...an image to generate indices in order to describe it for the purpose of content based ... See full document

5

An Unsupervised Dynamic Image Segmentation using Fuzzy Hopfield Neural Network based Genetic Algorithm

An Unsupervised Dynamic Image Segmentation using Fuzzy Hopfield Neural Network based Genetic Algorithm

... scale image segmentation that divides an image into ...images using intensity information along with neighborhood ...the image. This technique is a powerful method for image ... See full document

8

Multi-pixel Visual Cryptography for color images with Meaningful Shares

Multi-pixel Visual Cryptography for color images with Meaningful Shares

... The important issue of visual cryptography is visual quality of recovered image. This paper presents Multi-pixel Visual Cryptography for color images to generate two meaningful shares. Some filters are proposed ... See full document

10

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

... stations and all the nodes in the network act as routers as well as hosts to facilitate the unconstrained ...routing, dynamic network topology, limited resources, network overhead, scalability, stable ... See full document

5

A Novel Approach for Cooling Electronics Using a Combined Heat Pipe and Thermoelectric Module

A Novel Approach for Cooling Electronics Using a Combined Heat Pipe and Thermoelectric Module

... CPU and other computer chips, is greatly important due to the growth of high speed performance chips, which operate at elevated heat ...RAM and HDD also contributing to the overall generation of heat inside ... See full document

8

J. Braz. Chem. Soc.  vol.25 número6

J. Braz. Chem. Soc. vol.25 número6

... corresponding pyrazoline derivatives in excellent yields using cellulose sulfuric acid as an inexpensive biopolymer- based solid acid catalyst under solvent-free conditions. Prominent advantages of this green ... See full document

10

Dynamic Reputation Based Trust Management Using Neural Network Approach

Dynamic Reputation Based Trust Management Using Neural Network Approach

... T and polls its peers about the reputations of ...enquiring and a public key PKpoll generated on the fly for the poll request, with which responses to the poll will need to be ...network and ... See full document

5

Experimenting with the Novel Approaches in Text Steganography

Experimenting with the Novel Approaches in Text Steganography

... However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text ...yet novel approaches that overcome ... See full document

13

Metabolic Profiles of Obesity in American Indians: The Strong Heart Family Study.

Metabolic Profiles of Obesity in American Indians: The Strong Heart Family Study.

... obesity and diabetes, it is highly likely that the identified obesity-associated metabolites might be also related to insulin resistance, a common mechanism underlying both obesity and ...obesity and ... See full document

16

J. Braz. Chem. Soc.  vol.21 número5

J. Braz. Chem. Soc. vol.21 número5

... R and S coniguration, we decided to use aspartic acid as starting ...The key step proposed in this synthesis is a chemoselective nucleophilic substitution at a C4 methylester group in 6 and 7 ... See full document

12

Vocabulary Length Experiments for Binary Image Classification Using BOV Approach

Vocabulary Length Experiments for Binary Image Classification Using BOV Approach

... given image database. We follow a simple approach to construct the visual vocabulary in which we quantize the SIFT descriptors into visual ...1416 key points are typically extracted per image ... See full document

8

A Lossless Data Hiding Technique based on AES-DWT

A Lossless Data Hiding Technique based on AES-DWT

... Both steganography and cryptography are processes for information hiding, which require different implementation ...cryptography and steganography can be complementary processes, enabling a ... See full document

9

Show all 10000 documents...