Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Steganography is the art of covered or hidden writing. The main purpose of steganography is covert communication-to hide the existence of a message from a third party. Steganography is generally used to hide important information in a visible media mostly an image. A good approach to steganography must provide two attributes: high security against the different attacks called steganalysis, which is nothing but a technique used for detecting hidden information using steganography method and second is compression. Image compression not only reduces storage but also benefits transmission. In this paper the image steganography is achieved with enhanced security due to QR code and compression using DWT transform, without affecting the actual cover image due to addition of secret information which is in form of QR codes. The process for embedding the QR codes has been carried out using Embedding and Extraction algorithm which insures secure and fast transmission of stego image. These results validate the practical feasibility of the proposed method for security applications.
QR Code (QUICK RESPONCE) are basically embedded with data that can be easily decoded, OR code have substantial role in mobile application like online payment, adhar card etc... In every camera enabled smartphone can scan QR code. The QR code are 2D barcodes that encode text information. In recent year's security of information have become big concern in the internet, so the information hiding has become an important issue. In steganography, Steganography hides the data in a medium suchas text file, image, audio, video etc., and restrain the very existence of the message in the medium from a third party .In this paper ithides the message inside a cover image. The main approaches to steganography must provide two attributes: High security against the dissimilar assaults called steganalysis and second is compression. In this paper a latest approach is proposed for secret communication by combining the concept of steganography and QR codes. In the suggested method include two phase: (1) Encrypting the text message by a QR code encoder and creating a QR code, (2) Hiding the secret image inside the generated QR code. This proposed approach has to be employed in communicating confidential information.
QR Code (QUICK RESPONCE) are basically embedded with data that can be easilydecoded, OR code have substantial role in mobile application like online payment, adhar card etc... In every camera enabled smartphone can scan QR code. The QR code are 2D barcodes that encode text information. In recent year?s security of information have become big concern in the internet, so the information hiding has become an important issue. Insteganography, Steganography hides the data in a medium suchas text file, image, audio, video etc., and restrain the very existence of the message in themedium from a third party .In this paper ithides the message inside a cover image. The main approaches to steganography must provide two attributes: High security against the dissimilar assaults called steganalysis and second is compression.In this paper a latest approach is proposed for secret communication by combining the concept of steganography and QR codes. In the suggested method include two phase: (1) Encrypting the text message by a QR code encoder and creating a QR code, (2) Hiding the secret image inside the generated QR code.This proposed approach has to be employed in communicating confidential information.
As the day to day analysis, we need to keep our data safe so that our private data is safe. It can be applied through steganography. Also, we do add the QR code for the purpose of increasing the security and ease to access the information which is been sent. Steganography is being used with AES algorithm and LSB steganography. QR code is used to enhance the security.
2012 •
2014 •
Steganography is an important area of research in recent years involving a number of applications. It is the science of Embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In this paper we present an image steganography that combines Discrete wavelet transform(DWT),Least significant bit(LSB) and Encryption techniques on raw images to enhance the security of secret message. Intially, DWT algorithm is used to transform image from spatial domain to frequency domain. Then we encrypt our message using DES. Finally we embed secret bits into the cover image to derive stego-image using LSB.
2013 •
The steganography research has grown rapidly since last decade. This technique has been used to hide different types of information, such as medical, personal and business information and also in some cases it was used in criminal act. This paper presents a robust steganographic scheme focused on the embedding of a secret image into a cover image in the DCT domain using QIM embedding algorithm. The experimental results show the robustness of the proposed scheme against the JPEG compression and noise contamination, while keeping an imperceptibility of hidden data. The proposed scheme also is robust to commercial stego-analyzers, which cannot detect the presence of the hidden data in the stegoimage generated by the proposed scheme. The better performance of the proposed scheme is shown comparing with a previously reported steganography algorithm with the same objective of the proposed one. Keywords— Steganography, DCT, JPEG compression, QIM, payload, robustness, secret image
2024 •
Il contributo si inserisce nello Speciale (Iceberg) su "La lingua e la realtà" cercando di fare chiarezza su alcuni presupposti epistemologici della scienza linguistica. In primo luogo, si ribadisce che l'attività linguistica è un'attività simbolica (nel senso che stabilisce legami convenzionali, non necessari, tra parole e concetti - i quali, a loro volta, mediano il rapporto con le cose) e che solo in alcune aree periferiche la lingua fa riferimento alla realtà (parole/espressioni iconiche o deittiche, verbi performativi ecc.) in relazione all'intenzione di chi parla (e dice io, qui, ora, bum, prometto ecc.). In secondo luogo, si confuta la tesi per cui la lingua non avrebbe una struttura grammaticale consolidata che prescinda dalla molteplicità degli usi individuali, parlati e scritti: l’esistenza di una simile struttura è infatti la condizione per ogni sviluppo possibile del sistema stesso. Se è vero che le regole di una lingua sono sedimentate nel tempo e soggette a evoluzioni dovute a molti fattori (fra i quali l’uso politico o ideologico da parte di persone e di gruppi e le mode linguistiche), nondimeno la possibilità di comunicazione e di comprensione dipende dalla continuità e stabilità degli usi e dall'accordo sociale intorno alle norme che lo regolano. Perché, quando parliamo di linguaggio, "arbitrario" non vuol dire "basato sull'arbitrio individuale" e "simbolico" non vuol dire "puramente rappresentativo" né "potentemente allusivo" ma "basato su simboli" (che non sono glifi). Gli esempi letterari a corredo dell'argomentazione illustrano, in forma paradossale, gli effetti del ribaltamento di tali presupposti.
Rev. Cient. General José María Córdova
Implicaciones del Control de Convencionalidad: cumplimiento de la Sentencia Radilla Pacheco versus México y el caso de la masacre de Santo Domingo versus Colombia [Implications of control of conventionality]El objetivo esencial es el análisis y la demostración de la influencia que ha tenido la Corte Interamericana de Derechos Humanos (Corte IDH) en los sistemas jurídicos de protección de derechos humanos de México y Colombia. Asimismo, analiza el grado de cumplimiento de la Sentencia Radilla Pacheco y la masacre de Santo Domingo. El trabajo se ha dividido en cuatro ejes temáticos: el primero se enfoca en la evolución del concepto de Control de Convencionalidad (CCV); el segundo revisa la forma en la que la Corte IDH interpreta la Convención Americana de Derechos Humanos (CADH); el tercero analiza el grado de cumplimiento de la Sentencia Radilla Pacheco versus México dictada el 30 de noviembre de 2009 y su influencia en el sistema jurídico mexicano; y el cuarto eje expone la Sentencia de la masacre de Santo Domingo versus Colombia dictada en noviembre de 2012; además se constata la efectividad de la propia Corte IDH ante este controvertido caso. La conclusión muestra que el CCV ha ido evolucionando en los últimos años a fin de superar los obstáculos que ha encontrado dentro de algunos sistemas jurídicos estatales de protección de derechos humanos. Por tal motivo, se concluye afirmando que la Corte IDH sí ha sido efectiva para la resolución de casos controversiales y ha coadyuvado al cumplimiento de la protección de los derechos humanos [The main objective is to analyze and show the influence of the Interamerican Court of Human Rights in the legal systems that protect the human Rights in Mexico and Colombia. Also, analyzes the fulfillment of the judgment of case Radilla Pacheco y La masacre de Santo Domingo. This work paper is divided in four topics: the first one is about the evolution of Conventionality Control (CCV), the second one checks the Court interpretation of American Convention on Human Rights (ACHR); the third one, analyzes the fulfillment of Radilla Pacheco V Mexico’s judgement dictated on November 30-2009 and its influence in Mexican Legal system; the fourth one exposes the case of Masacre de Santo Domingo vs Colombia, dictated on november-2012; moreover, it finds the effectiveness of the Court in the case. Finally, the conclusion shows the evolution of CCV, to overcome the obstacles of legal systems that protects human rights. For that reason, it concludes that the Interamerican Court of Human Rights is effective solving complex cases and helps the protection of Human Rights]
Se presenta el estudio de los fluidos en estado de equilibrio, sus causas y sus efectos, así como problemas de aplicación.
2010 •
Protein Expression and Purification
Purification of Recombinant Human Transcription Factor IIB by Immunoaffinity Chromatography1994 •
Derecho animal
A cara descubierta en favor de los animales: Francia, el 'Code Civil' y la Constitución2013 •
Top thuốc sắt hữu cơ tốt nhất cho mẹ bầu
Top thuốc sắt hữu cơ tốt nhất cho mẹ bầu2024 •
International journal of biological macromolecules
Investigating the site selective binding of busulfan to human serum albumin: Biophysical and molecular docking approaches2017 •
2014 •
2011 •
IOP Conference Series: Materials Science and Engineering
Advanced procedure for documenting and assessment of Cultural Heritage: from Laser Scanning to Finite ElementPlastic and Reconstructive Surgery
X-Chromosome-Shaped Paired Flaps for Small and Closely Located Facial Defects1999 •