[go: up one dir, main page]

Wu et al., 2018 - Google Patents

Text coverless information hiding method based on hybrid tags

Wu et al., 2018

View PDF
Document ID
82175194703078153
Author
Wu Y
Sun X
Publication year
Publication venue
Journal of Internet Technology

External Links

Snippet

In recent years, a novel information hiding method called coverless information hiding, which has the anti-detection ability due to its non-modification of the stego cover, has drawn the attention of researchers. In coverless information hiding, the communication party uses …
Continue reading at jit.ndhu.edu.tw (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99936Pattern matching access

Similar Documents

Publication Publication Date Title
Majeed et al. A review on text steganography techniques
CN110929125B (en) Search recall method, device, equipment and storage medium thereof
Xia et al. Secure image LBP feature extraction in cloud-based smart campus
Xiang et al. Linguistic steganalysis using the features derived from synonym frequency
US6622248B1 (en) File data retrieving device and recording medium containing computer program for controlling the same
CN111797409B (en) A carrier-free information hiding method for big data Chinese text
Taleby Ahvanooey et al. An innovative technique for web text watermarking (AITW)
Ramakrishnan et al. Text steganography: a novel character‐level embedding algorithm using font attribute
Long et al. Coverless information hiding method based on web text
Kaushik et al. Zero-width text steganography in cybercrime attacks
Zhang et al. Coverless text information hiding method using the frequent words distance
Zhang et al. Coverless Text Information Hiding Method Using the Frequent Words Hash.
CN113742763A (en) Confusion encryption method and system based on government affair sensitive data
CN111027081B (en) Text carrierless information hiding method based on feature mapping
Yaghobi et al. Text steganography in webometrics
CN113268986A (en) Unit name matching and searching method and device based on fuzzy matching algorithm
Liu et al. To deliver more information in coverless information hiding
Guan et al. A novel coverless text steganographic algorithm based on polynomial encryption
Song et al. Privacy-preserving method for face recognition based on homomorphic encryption
Liu et al. Multi-keywords carrier-free text steganography method based on Chinese pinyin
Wu et al. Text coverless information hiding method based on hybrid tags
Panchal Differential privacy and natural language processing to generate contextually similar decoy messages in honey encryption scheme
Tiwari et al. A novel watermarking scheme for secure relational databases
Liu et al. Multi-keywords carrier-free text steganography based on part of speech tagging
Wu et al. Coverless steganography based on english texts using binary tags protocol