期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Dynamic Steganography Method for Web Images with Average Run- Length-Coding
1
作者 Jin Liu Yiwen Zhang 《Journal of Computer Science Research》 2021年第1期28-32,共5页
Web page has many redundancies,especially the dynamic html multimedia object.This paper proposes a novel method to employ the commonly used image elements on web pages.Due to the various types of image format and comp... Web page has many redundancies,especially the dynamic html multimedia object.This paper proposes a novel method to employ the commonly used image elements on web pages.Due to the various types of image format and complexity of image contents and their position information,secret message bits could be coded to embed in these complex redundancies.Together with a specific covering code called average run-length-coding,the embedding efficiency could be reduced to a low level and the resulting capacity outperforms traditional content-based image steganography,which modifies the image data itself and causes a real image quality degradation.Our experiment result demonstrates that the proposed method has limited processing latency and high embedding capacity.What’s more,this method has a low algorithm complexity and less image quality distortion compared with existing steganography methods. 展开更多
关键词 STEGANOGRAPHY Web image Covering codes run length coding
在线阅读 下载PDF
Efficient Array Coding Scheme for Large-Scale Storage Systems
2
作者 Dan Tang 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期102-106,共5页
A family of array codes with a maximum distance separable(MDS) property, named L codes, is proposed. The greatest strength of L codes is that the number of rows(columns) in a disk array does not be restricted by t... A family of array codes with a maximum distance separable(MDS) property, named L codes, is proposed. The greatest strength of L codes is that the number of rows(columns) in a disk array does not be restricted by the prime number, and more disks can be dynamically appended in a running storage system. L codes can tolerate at least two disk erasures and some sector loss simultaneously, and can tolerate multiple disk erasures(greater than or equal to three) under a certain condition. Because only XOR operations are needed in the process of encoding and decoding, L codes have very high computing efficiency which is roughly equivalent to X codes. Analysis shows that L codes are particularly suitable for large-scale storage systems. 展开更多
关键词 codes decoding dynamically parity restricted sector encoding operations running correcting
在线阅读 下载PDF
A New Compression Scheme for Secure Transmission
3
作者 M.Baritha Begum Y.Venkataramani 《International Journal of Automation and computing》 EI CSCD 2013年第6期578-586,共9页
Encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and ba... Encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and bandwidth-constrained channel, it is customary to compress the data first and then encrypt it. In this paper, a novel algorithm, the new compression with encryption and compression (CEC), is proposed to secure and compress the data. This algorithm compresses the data to reduce its length. The compressed data is encrypted and then further compressed using a new encryption algorithm without compromising the compression efficiency and the information security. This CEC algorithm provides a higher compression ratio and enhanced data security. The CEC provides more confidentiality and authentication between two communication systems. 展开更多
关键词 Data compression encryption algorithm compression with encryption and compression (CEC) algorithm Huffmancoding run length coding bits per character (BPC).
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部