Zobrazeno 1 - 10
of 426
pro vyhledávání: '"text steganography"'
Autor:
Bahman Khosravi
Publikováno v:
AUT Journal of Mathematics and Computing, Vol 6, Iss 1, Pp 39-50 (2024)
Recently, a serious problem in communications is security. Hiding data is one of the most important security techniques. Steganography is the art and science of hiding information in a cover media. Texts are the most usual method of communication and
Externí odkaz:
https://doaj.org/article/da66450232324b5d9ee7818d458af661
Publikováno v:
JISR on Computing, Vol 22, Iss 2 (2024)
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and R
Externí odkaz:
https://doaj.org/article/bc058e26057b4ee39ec00a127ed8cf71
Autor:
Esam Ali Khan
Publikováno v:
PeerJ Computer Science, Vol 10, p e2236 (2024)
Mega events attract mega crowds, and many data exchange transactions are involved among organizers, stakeholders, and individuals, which increase the risk of covert eavesdropping. Data hiding is essential for safeguarding the security, confidentialit
Externí odkaz:
https://doaj.org/article/e20321d11dbb40e3b0c321866334fb2a
Publikováno v:
Tongxin xuebao, Vol 44, Pp 176-186 (2023)
Aiming at the problems that “over optimizing” the quality of steganographic text and lack of constraints on the semantic expression of the generated steganographic text in existing generative text steganography methods, a generative text steganog
Externí odkaz:
https://doaj.org/article/404108579e5d41d3962d36aedb72a854
Publikováno v:
Tongxin xuebao, Vol 43, Pp 121-132 (2022)
To solve the problems of high channel construction risk, information crossover, and insufficient concealment in the blockchain covert communication, a generative blockchain-based covert communication model based on Markov chain was proposed.First, th
Externí odkaz:
https://doaj.org/article/e21b800728f54e52b9e89dace14692d1
Publikováno v:
Tongxin xuebao, Vol 43, Pp 240-253 (2022)
A text steganography method based on automatic selection coding and dynamic word selection strategy was proposed for the inflexible text coding method and candidate word increasing number leading to the low quality of generated steganographic text.St
Externí odkaz:
https://doaj.org/article/4c414dfb8eb14083b939d12f87e56a3e
Autor:
Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 5, Pp 2180-2191 (2022)
With the advancement of technology, the maximum data hiding capacity and security of cover objects have become a very challenging task for researchers, particularly in text carrier. Text carrier depicts low hiding capacity but more secure for the det
Externí odkaz:
https://doaj.org/article/b468f4adcad1486da6e535ab03d3c040
Publikováno v:
IEEE Access, Vol 10, Pp 94403-94416 (2022)
Steganography is one of the oldest methods for securely sending and transferring secret information between two people without raising suspicion. Recently, the use of Artificial Intelligence (AI) has become simpler and more widely used. Since the eme
Externí odkaz:
https://doaj.org/article/655fb3549fd149e6bd52f8a870f0905e
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 9, Pp 1108-1120 (2021)
Sensitive information requires many security systems to be protected by secret keys. One of these practical security systems is the so-called counting-based secret sharing, in which certain key portions are distributed to allow sharing access by spec
Externí odkaz:
https://doaj.org/article/26c9da7da34d48ed961d3bd06261b115
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.