Wu et al., 2018 - Google Patents
Text coverless information hiding method based on hybrid tagsWu et al., 2018
View PDF- Document ID
- 82175194703078153
- Author
- Wu Y
- Sun X
- Publication year
- Publication venue
- Journal of Internet Technology
External Links
Snippet
In recent years, a novel information hiding method called coverless information hiding, which has the anti-detection ability due to its non-modification of the stego cover, has drawn the attention of researchers. In coverless information hiding, the communication party uses …
- 238000004891 communication 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
- Y10S707/99936—Pattern matching access
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Majeed et al. | A review on text steganography techniques | |
CN110929125B (en) | Search recall method, device, equipment and storage medium thereof | |
Xia et al. | Secure image LBP feature extraction in cloud-based smart campus | |
Xiang et al. | Linguistic steganalysis using the features derived from synonym frequency | |
US6622248B1 (en) | File data retrieving device and recording medium containing computer program for controlling the same | |
CN111797409B (en) | A carrier-free information hiding method for big data Chinese text | |
Taleby Ahvanooey et al. | An innovative technique for web text watermarking (AITW) | |
Ramakrishnan et al. | Text steganography: a novel character‐level embedding algorithm using font attribute | |
Long et al. | Coverless information hiding method based on web text | |
Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
Zhang et al. | Coverless text information hiding method using the frequent words distance | |
Zhang et al. | Coverless Text Information Hiding Method Using the Frequent Words Hash. | |
CN113742763A (en) | Confusion encryption method and system based on government affair sensitive data | |
CN111027081B (en) | Text carrierless information hiding method based on feature mapping | |
Yaghobi et al. | Text steganography in webometrics | |
CN113268986A (en) | Unit name matching and searching method and device based on fuzzy matching algorithm | |
Liu et al. | To deliver more information in coverless information hiding | |
Guan et al. | A novel coverless text steganographic algorithm based on polynomial encryption | |
Song et al. | Privacy-preserving method for face recognition based on homomorphic encryption | |
Liu et al. | Multi-keywords carrier-free text steganography method based on Chinese pinyin | |
Wu et al. | Text coverless information hiding method based on hybrid tags | |
Panchal | Differential privacy and natural language processing to generate contextually similar decoy messages in honey encryption scheme | |
Tiwari et al. | A novel watermarking scheme for secure relational databases | |
Liu et al. | Multi-keywords carrier-free text steganography based on part of speech tagging | |
Wu et al. | Coverless steganography based on english texts using binary tags protocol |