• 沒有找到結果。

[PDF] Top 20 A covert communication method via spreadsheets by secret sharing with a self-authentication capability

Has 10000 "A covert communication method via spreadsheets by secret sharing with a self-authentication capability" found on our website. Below are the top 20 most common "A covert communication method via spreadsheets by secret sharing with a self-authentication capability".

A covert communication method via spreadsheets by secret sharing with a self-authentication capability

A covert communication method via spreadsheets by secret sharing with a self-authentication capability

... r a c t A new covert communication method with a self-authentication capability for secret data hiding in spreadsheets using the ... See full document

11

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

... when a steganalyst has the information of the probability distribution related to the ...such a statistical test depends on the scatter level of the chosen numeric data of the cover ...three ... See full document

39

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

... the self-repairing of the original image data is that the data to be embedded in the carrier are often large ...here with the alpha channel as the carrier, this is not a problem because the cover ... See full document

12

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

... the method later by using an edge line similarity measure to select flippable pixels for the purpose of reducing the ...study, a method for authentication of document im- ages ... See full document

11

Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication*

Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication*

... In the remainder of this paper, we describe the proposed method by giving an algorithm for hiding a secret binary image behind a cover noise image in Section U, and a corres[r] ... See full document

5

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

... IDING BY I NVISIBLE ASCII C ODES ASCII codes, expressed as hexadecimal numbers, were designed to represent 8-bit characters for information ...into a program do not change its ... See full document

8

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... 題名: Secret image sharing with steganography and authentication 作者: ...Information Communication 關鍵詞: Secret image sharing;Steganography;Authentication;Camouflage ... See full document

1

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... Abstract A novel approach to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is ...proposed. A ... See full document

10

A new approach to covert communication via PDF files

A new approach to covert communication via PDF files

... Author affiliation:(1) Department of Computer Science, National Chiao Tung University, Hsinchu, 30010, Taiwan; (2) Department of Computer Science and Information Engineering, Asia Univ[r] ... See full document

2

A new approach to covert communication via PDF files

A new approach to covert communication via PDF files

... Abstract: A new covert communication method via PDF files is ...proposed. A secret message, after being encoded by a special ASCII code and embedded at ... See full document

2

A new approach to covert communication via PDF files

A new approach to covert communication via PDF files

... the secret message is regarded as a string of characters represented by the 96 ASCII codes listed in Table ...inserted A0’s to make the resulting stego-file size as small as possible, we ... See full document

9

Secret multimedia information sharing with data hiding capability by simple logic operations

Secret multimedia information sharing with data hiding capability by simple logic operations

... for secret multimedia information sharing with data-hiding capability is ...pro-posed. Sharing is accomplished by transforming a set of secret data into an ... See full document

1

Secret image sharing with capability of share data reduction

Secret image sharing with capability of share data reduction

... 摘要: A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capability of share data reduction is proposed.. A secret image is first transformed[r] ... See full document

1

Secret image sharing with capability of share data reduction

Secret image sharing with capability of share data reduction

... value兲 by a designed transformation. The DC value is taken to be a key for this ...for sharing is re- stricted to be just the DC value, and so the amount of information to be shared and that ... See full document

6

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

... tampering with digital images is easy to get, since modern pervasive and pow- erful image manipulation tools have made imperceptible modification of images very ...is a technique for inserting information ... See full document

17

COVERT COMMUNICATION VIA PDF FILES BY NEW DATA HIDING TECHNIQUES*

COVERT COMMUNICATION VIA PDF FILES BY NEW DATA HIDING TECHNIQUES*

... cause a wrong display of the resulting PDF ...get a correct stego-PDF ...the secret message in an indirect object B to get B ′ ...updated by increasing them for a value D which is the ... See full document

6

Secret Multimedia Sharing with Steganographic Effects via PNG Images

Secret Multimedia Sharing with Steganographic Effects via PNG Images

... new method by secret sharing with steganographic effects for sharing secret images by PNG images is ...The sharing secret scheme is based on solving ... See full document

12

Authentication of Binary Document Images in PNG Format Based on A  Secret Sharing Technique

Authentication of Binary Document Images in PNG Format Based on A Secret Sharing Technique

... image authentication, binary document image, secret sharing, data hiding, PNG ...is a way to satisfy the requirement. As a result of the nature of digitized data, it is not difficult to ... See full document

6

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

... explore a new embeddable space for data hiding, aiming at providing more data hiding capacity, better quality of the resulting stego-image and stronger ...As a result, the PNG image with the alpha ... See full document

16

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... the secret is shared by a set of participants partitioned into several levels, and the secret data can be reconstructed by satisfying a sequence of threshold require- ments ...to ... See full document

9

Show all 10000 documents...