A Digital Data Hiding Technique with Missing Puzzle and Seek Algorithm.

M. Islam, Tasfia Tabassum, M. Hossen, Shahed Hossain, Mosharof Hossain, Anik Hassan Jony
{"title":"A Digital Data Hiding Technique with Missing Puzzle and Seek Algorithm.","authors":"M. Islam, Tasfia Tabassum, M. Hossen, Shahed Hossain, Mosharof Hossain, Anik Hassan Jony","doi":"10.1109/ICECA49313.2020.9297600","DOIUrl":null,"url":null,"abstract":"presently a day’s data dissemination over the world become progressively simpler because of quick web and advancement of various kind of technology, for this explanation individuals become increasingly stressed about their information security. For this nowadays people use steganography to make the information secure by hiding and blending the data that make them hard to perceive by hackers. For concealing mystery data in content and pictures, there exists a huge assortment of Steganography methods some are more mind-boggling than others and every one of them has particular solid and feeble focuses. We are looking for the calculation to discover the missing puzzle word which otherwise called mystery calculation by using seek algorithm. For improving the security of mystery message, the message is mixed utilizing onetime cushion plot before being covered and Figure content is at that point hidden in the spread. This is the most efficient data hiding security system and probably its increases the data security all over the world and maintain our privacy.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA49313.2020.9297600","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

presently a day’s data dissemination over the world become progressively simpler because of quick web and advancement of various kind of technology, for this explanation individuals become increasingly stressed about their information security. For this nowadays people use steganography to make the information secure by hiding and blending the data that make them hard to perceive by hackers. For concealing mystery data in content and pictures, there exists a huge assortment of Steganography methods some are more mind-boggling than others and every one of them has particular solid and feeble focuses. We are looking for the calculation to discover the missing puzzle word which otherwise called mystery calculation by using seek algorithm. For improving the security of mystery message, the message is mixed utilizing onetime cushion plot before being covered and Figure content is at that point hidden in the spread. This is the most efficient data hiding security system and probably its increases the data security all over the world and maintain our privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于寻谜算法的数字数据隐藏技术。
目前,由于网络的快速发展和各种技术的进步,世界上一天的数据传播变得越来越简单,因此人们越来越重视他们的信息安全。为此,现在人们使用隐写术,通过隐藏和混合数据,使他们难以被黑客察觉,使信息安全。为了隐藏内容和图片中的神秘数据,存在着各种各样的隐写方法,有些方法比其他方法更令人难以置信,每一种方法都有特定的坚实和薄弱的重点。我们用寻道算法寻找解谜词的计算,也就是谜题计算。为了提高神秘消息的安全性,在消息被覆盖之前利用一次性缓冲情节进行混合,此时图形内容隐藏在传播中。这是最有效的数据隐藏安全系统,它可能会增加全世界的数据安全,维护我们的隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of Prosodic features for the degree of emotions of an Assamese Emotional Speech MCU system based on IEC61508 for Autonomous Functional safety platform Comparative analysis of facial recognition models using video for real time attendance monitoring system Analysis of using IoT Sensors in Healthcare units Supported by Cloud Computing Human Friendly Smart Trolley with Automatic Billing System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1