ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Literature
Communication
Languages
Research
Architecture and Urbanism
Computing
Technology
Economy
all records (74)

Languages
English
Portuguese
Spanish
French
German

Countries
Brazil
Indonesia
USA
Spain
Ukraine
Chile
Switzerland
Argentina
South Africa
Colombia
all records (73)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
44.319  Articles
1 of 4.433 pages  |  10  records  |  more records»
Teknik yang banyak digunakan untuk menyebarkan suatu citra rahasia kepada n orang adalah dengan cara membagi citra rahasia ke dalam beberapa bagian yang kemudian diproses menggunakan skema (k, n)-Shamir Secret Sharing yang dikemukakan oleh Adi Shamir (197... see more

Saat ini sangat diperlukan sebuah Sistem yang mengkombinasikan keunggulan kriptografi dan keunggulan steganografi. Kriptografi yang memberikan manfaat pesan dalam keadaan tidak dapat dibaca dan steganografi yang memberikan manfaat bahwa pesan tidak dapat ... see more

BPCS (Bit-Plane Complexity Segmentation) is a fairly new steganography technique The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at how much of the change bits con... see more

Bit-Plane Complexity Segmentation (BPCS) is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes cont... see more

Security in communication is very important for everyone to pay attention to. To prevent data leakage and illegal retrieval of data, cryptography and steganography can be used. In this study, GOST and XOR LSB with PRNG were used to inject text into images... see more

AbstractCryptographic algorithms can be used to secure images. One of the cryptographic algorithms that can be used to encrypt images is the Serpent algorithm. However, the Serpent algorithm requires a long encryption and decryption process. In addition, ... see more

One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion o... see more

Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s sus... see more

1 of 4.433 pages  |  10  records  |  more records»