Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers. The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Das Verhaltnis des assimilierten arabischen VIII Stammes zum akkadischen
Wielands Hauptwerk die Geschichte des Agathon (1766/73,1794) ist
der wichtigste Roman der Aufklärungsepoche (1720-1785). Die Verlegung der
Handlung in die Antike widerspiegelt die kulturelle Blüte der vorbildhaften Zeit
zwischen 5. und 4. Jhd. v. Chr.
Beim Lesen des Romans findet man unzählige (über 70) Namen aus der
Antike; von Herrschern, Strategen, Philosophen, Dichtern, Künstlern . . . etc,
woüber man unbedingt informiert werden muss, um deren Zusammenhang in der
Geschichte zu verstehen. Vorübergehend erwähnte Personennamen gibt Wieland
meistens als Beispiel für eine Situation oder ein Verhalten. Dies gab mir den
Anstoß, die wichtigsten Figuren
... Show MoreAs usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple
... Show MoreLe but de la présente étude est de mettre en lumière la fragilité des personnages dans le roman de "Mme Bovary". En fait, la fragilité n'est pas uniquement propre aux héros de Flaubert. Nous pouvons attribuer cette caractéristique à la plupart des protagonistes du XIXe siècle. Nous pouvons dire qu'aucun auteur n'excelle autant que Flaubert à incarner cette fragilité.
Flaubert présente un personnage frustré de toute force et de toute volonté comme le personnage d'Emme Bovary.
Ce personnage n'a pas de confiance en soi, E
... Show MoreIn der Nachwendezeit erschienen im deutschen Buchmarkt zahlreiche Werke deutscher Autoren, die einen Trend oder Tendenz markieren können. Im Mittelpunkt der vorliegenden Arbeit steht die Analyse der Struktur und des Inhalts von drei erst nach der Wende erschienen Briefromanen: Alles, alles Liebe (2000) von Barbara Honigmann (geb. 1949), Die Liebenden (2002) von Gerhard Henschel (Jahrgang 1962) und Neue Leben (2005) des im Jahre 1962 geborenen Ingo Schulze. Dieser Beitrag macht sich zur Aufgabe zu erklären, ob der Briefroman ein neuer Trend in der deutschen Literatur nach der Wende ist.
Abstract
In the after( Wende) period a large collection of literary works for German writers has been p
... Show More