[PDF][PDF] 在多级文字隐写术中使用图像的拟议算法

GMTK Aldabagh - 西南交通大学学报, 2020 - researchgate.net
Hash functions useful in many operating systems to encrypt … Another way we define it as
square of pixels difference values … security purpose we can also add the video steganography

影像隱藏, 驗證與修復之研究

張御傑, 林志青 - 2008 - ir.lib.nycu.edu.tw
… in many existing steganography methods reported recently. … to the hash function of Wong’s
previous method [68]. These … the level of security, we will permute the MSOC code by using a …

以Microsoft Office 文件作資訊隱藏之新研究

劉宗原, 蔡文祥 - 2009 - ir.lib.nycu.edu.tw
… center pixel is shown for clarity; the east and south pixels are … presentations watermarked
with different security keys, each … Linguistic steganography methods that generate the cover …

在影像與文字檔案中進行資料隱藏的技術與應用之研究

李義溪, 蔡文祥 - 2007 - ir.lib.nycu.edu.tw
… [30-31] presented text-based steganographic methods which use … [73] use hash functions
to compute digests of web page … To improve the security protection effect further, we propose …

供資訊隱藏應用之大量資料植入與搜尋技術之研究

賴宣宏, 蔡文祥 - 2006 - ir.lib.nycu.edu.tw
… A steganographic method is proposed in this study, which … color a pixel has as (5, square5)
if and only if the index of the pixel is 5… To improve the security is a future work of this research. …

高容量JPEG 資訊隱藏及其在影像分享, 驗證與修復之應用

林志青 - 2009 - ir.lib.nycu.edu.tw
… The 8×8 pixels of each block were transformed using discrete … data were computed using
the MD5 hash function [42]. Last, … Section 2.4 discusses parameters setting and security. Last, …

在行動裝置上作視訊及文字之資訊隱藏研究

王彝琳, 蔡文祥 - 2005 - ir.lib.nycu.edu.tw
… messages on the Internet securely, a covert communication by … of the result after applying
a steganographic technique on a … is to use each macroblock to embed a watermark pixel. The …

[HTML][HTML] 结合块旋转和马赛克拼图的生成式伪装方法

王洋, 邵利平, 陆海 - 2020 - cjig.cn
… circle image similar to cover image pixel was set to conceal the secret … The added random
rotation angles also provide the security … Coverless image steganography using histograms of …

数字图像多功能水印综述

赵蕾, 桂小林, 邵屹杨, 戴慧珺 - 计算机辅助设计与图形学学报, 2024 - jcad.cn
… , classifications, key technologies, achievable functions, and application scenarios.
Furthermore, multipurpose image watermarking methods developed in the past decade are …

[图书][B] 信息隐藏: 理论与技术

王育民 - 2006 - books.google.com
… 杂凑函数(hash function) 是实现数据完整性, 数字签字的主要手段. … (secure hash algorithm,
SHA), 用于数字签 字标准算法(digital signature standard, DSS), 亦可用于其他需要用Hash 算法的…