"Steganography" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 8 of 13 - About 124 Essays
  • Powerful Essays

    Architecture and Modernism

    • 4989 Words
    • 20 Pages

    As some critics contended‚ postmodernism represents a break with the modernist notion that architecture should be technologically rational‚ austere and functional‚ discuss the ways in which one postmodern architect has developed strategies which overcome these tendencies.  Juxtaposition is seen between the characteristics of early 20th century modern architecture and the artistic endeavours of postmodernism that followed.  To represent the ‘Less is More’ (R.Venturi‚ 1966‚ pg16) notion the modernist

    Premium Modernism Modern architecture Architecture

    • 4989 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Forensics

    • 1917 Words
    • 8 Pages

    FORENSICS Forensics‚ by and large‚ is the application of science to the legal process. It is an emerging research domain in India. There are many different types of forensic sciences baring their vital presence possibly in every field of human endeavor. Of these‚ let us now discuss about the computational‚ cyber and the DNA forensics. COMPUTATIONAL FORENSICS: The development of computational methods or mathematical and software techniques to solve forensic issues is called computational forensics

    Premium Forensic science DNA Computer forensics

    • 1917 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Dna Based Cryptography

    • 4527 Words
    • 19 Pages

    109 copied bases or in other words an error rate of 10-9 with the assumption of 1 base per square nanometer. Comparing to the 7 GB hard drive to a one base per square nanometer‚ it is 100‚000 times smaller.Clelland (1999) have demonstrated an steganography approach by hiding secret messages encoded as DNA strands among a multitude of random DNA. He used substitution cipher for encoding a plaintext where a unique base triplet is assigned to each letter t‚ each numeral and some special characters.

    Premium DNA

    • 4527 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Pseudorandom Archetypes

    • 2084 Words
    • 9 Pages

    1  Introduction System administrators agree that pseudorandom archetypes are an interesting new topic in the field of hardware and architecture‚ and cryptographers concur. Predictably‚ it should be noted that our framework analyzes the construction of write-ahead logging [19]. Similarly‚ a significant challenge in theory is the study of unstable models. To what extent can SCSI disks be constructed to solve this question? "Smart" algorithms are particularly unfortunate when it comes to sensor

    Premium Scientific method Massively multiplayer online game Algorithm

    • 2084 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Jpeg-Jsteg

    • 5547 Words
    • 23 Pages

    capacity factor. According to our experimental results‚ our new scheme can achieve an impressively high embedding capacity of around 20% of the compressed image size with little noticeable degradation of image quality. Key words: JPEG‚ data hiding‚ steganography‚ HVS‚ Jpeg–Jsteg‚ LSB substitution. 1. Introduction Image‚ audio‚ video‚ and many other kinds of data are nowadays mostly passed from person to person or from place to place in a digital form. It is often desirable to embed data into the digital

    Premium Data compression

    • 5547 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Data Leakage Detection

    • 2271 Words
    • 10 Pages

    DATA LEAKAGE DETECTION . Abstract - If a distributor has given sensitive data to a set of supposedly trusted agents (third parties) and if some of the data is leaked and found in an unauthorized place‚ the distributor must assess the likelihood that the leaked data came from one or more agents‚ as opposed to having been independently gathered by other means. The techniques used improves the probability of identifying leakages and finding guilty agent. These methods do not

    Premium Object-oriented programming Leak

    • 2271 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    ABSTRACT Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmissions over short distances from fixed and/or mobile devices‚ creating wireless PANs. Bluetooth provides a way to connect and exchange information between devices such as mobile phones‚ telephones‚ laptops‚ personal computers‚ printers‚ GPS receivers‚ digital cameras. So the security of the Bluetooth becomes very important. We have different types of security for Bluetooth to protect

    Premium Bluetooth

    • 2593 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    barcode

    • 5665 Words
    • 23 Pages

    Barcode From Wikipedia‚ the free encyclopedia Jump to: navigation‚ search For the taxonomic method‚ see DNA barcoding. [hide] This article has multiple issues. Please help improve it or discuss these issues on the talk page. This article needs attention from an expert on the subject. (January 2011) This article needs additional citations for verification. (January 2011) A UPC-A barcode symbol A barcode is an optical machine-readable representation of data relating to the

    Premium Barcode

    • 5665 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Study

    • 9037 Words
    • 37 Pages

    Today is the age of computer and internet. More and more people are creating their own websites to market their products and earn more profit from it. Having your own website will definitely help you in getting more customer purchasing your products but at the same time you can also also attract hackers to play around with your site. If you have not taken enough care to protect your site from hackers then your business can even come to an end because of these hackers. Before you hack into a system

    Premium Transmission Control Protocol

    • 9037 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    Ethernet and Hash Tables

    • 2481 Words
    • 10 Pages

    Architecting the Ethernet and Hash Tables Using SABER A BSTRACT Efficient algorithms and compilers have garnered tremendous interest from both experts and hackers worldwide in the last several years. Given the current status of virtual algorithms‚ steganographers obviously desire the analysis of public-private key pairs‚ which embodies the natural principles of hardware and architecture. We demonstrate not only that red-black trees and fiber-optic cables can collude to accomplish this goal‚ but that

    Premium Algorithm

    • 2481 Words
    • 10 Pages
    Powerful Essays
Page 1 5 6 7 8 9 10 11 12 13