Unseen to Seen by Digital Steganography

Author(s):  
Samir Kumar Bandyopadhyay ◽  
Vishal Goyal ◽  
Shawni Dutta ◽  
Sabyasachi Pramanik ◽  
Hafiz Husnain Raza Sherazi

In this digital era, most of the daily works of users are captured in digital forms like image, audio, video, or even text. These may contain sensitive, confidential, or private information as well. To keep these, there are different techniques exercised over the years like chest, coffer, repository, treasury, etc. Sometimes such ways of hiding information attract unintended users. Therefore, steganography has been applied to digital objects in a new form called digital steganography. This chapter enforces identifying methods in digital steganography. The basic model of any type of digital steganography is composed of three types of objects: cover object, text to be hidden, and stego object. Depending on the type of cover object, different types of digital steganography methods have been defined. Only data hiding in text is discussed.

2021 ◽  
Vol 19 (2) ◽  
pp. 273-298
Author(s):  
Sakineh Navidi-Baghi ◽  
Ali Izanloo ◽  
Alireza Qaeminia ◽  
Alireza Azad

Abstract The molecular structure of a complex metaphor comprises two or more atomic metaphorical parts, known as primary metaphors. In the same way, several molecular structures of metaphors may combine and form a mixture, known as mixed metaphors. In this study, different types of metaphoric integrations are reviewed and illustrated in figures to facilitate understanding the phenomena. Above all, we introduce double-ground metaphoric chain, a new form of metaphoric integration that has not been identified in the previous literature. Also, a distinction is made between single-ground and double-ground metaphoric chains. In the former, which has already been introduced, two basic metaphors are chained with the same form and have the same ground, while the latter includes two chained metaphors, one main metaphor plus a supportive one, with different grounds. In this analysis, we benefited from Conceptual Metaphor Theory (CMT) to analyse double-ground metaphoric chains. This study suggests that each metaphoric integration leads to a multifaceted conceptualization, in which each facet is related to one of the constituent micro-metaphors.


2016 ◽  
Vol 5 (3) ◽  
pp. 73 ◽  
Author(s):  
Haidar F. AL-Qrimli ◽  
Karam S. Khalid ◽  
Ahmed M. Abdelrhman ◽  
Roaad K. Mohammed A ◽  
Husam M. Hadi

The purpose of this work is to present a clear fundamental thought for designing and investigating straight bevel gear made of composite material. Composite materials have the advantage of being light, producing low noises, and extra loading capacities. Due to these properties, it is highly preferable over conventional materials. A comparison between different types of material used in a gear structure will be shown. The outcome shows that a new form of cheap material may be useful for designing a new type of lighter and stiffer gear, designed for robotic arm applications or any power transmission application.


2016 ◽  
Vol 29 (1) ◽  
pp. 48-68 ◽  
Author(s):  
Hisashi Sawaki

This paper considers an electoral model in which an incumbent and a challenger have ideological policy preferences that are private information. The incumbent may bias pre-electoral policies to signal preferences to the electorate with the aim of affecting the outcome of the election. When the two candidates are of completely different types, such a policy bias can occur only in a moderate direction. However, when their possible types overlap, a policy bias can be created in either a moderate or an extreme direction.


2015 ◽  
Vol 16 (1) ◽  
pp. 92-107
Author(s):  
Milan Orlić

In this paper I analyze two of Pekić’s novels in the light of Bakhtin’s concept of the open text of the polyphonic novel which Pekić develops by means of a new Narrator Figure and a new poetics based on an encyclopedic embedded text structure. Among several literary techniques developed from the beginnings of Pekić’s writing, crucial importance belongs to what I call the Explicit Narrator Figure (for instance, in The Time of Miracles, 1965), who speaks in his own voice as interpreter of found texts, and the Implicit Narrator Figure, who adopts the literary and non-literary voices of (many) others, to whose diction and style he assimilates his own voice (for example, in Pilgrimage of Arsenije Njegovan, 1970). This new (postmodern) narrator figure, both explicit and implicit, acts as an interpreter of «found» texts. What connects these two types of Narrator Figures is the document and related Embedded Narration: both narrators thus deal with the pre-texts as well as texts-in-texts, levels and layers of texts, proto-texts and meta-texts – various types of Framed/Embedded Narratives. The Implicit Narrator Figure deals with Biblical witnessed texts and the Explicit Narrator Figure uses personal testamentary texts. In such a way, both Implicit and Explicit Narrator Figures become the researchers of different types of literary and non-literary documents. These complex inter-textual explorations of the “library” of culture are “encyclopedic” in magnitude and reveal, in combination with the new Narrator Figure’s status as Editor and Interpreter, a new type of narrative text, constituted in the encyclopedic open novel structure. Pekić thus introduces a new form of inter-textuality into Serbian literature, implicitly extending Bakhtin’s (and Dostoevsky’s) legacy by drawing on the Serbian national literary canon and the entire Western cultural “library”.


2001 ◽  
Vol 9 (3) ◽  
pp. 160-164 ◽  
Author(s):  
Christine Zühlke ◽  
Yorck Hellenbroich ◽  
Andreas Dalski ◽  
Johann Hagenah ◽  
Peter Vieregge ◽  
...  

2013 ◽  
Vol 2013 ◽  
pp. 1-7
Author(s):  
Sabir Widatalla ◽  
M. Z. Liu

We introduce a new form of Laplace decomposition algorithm (LDA). By this form a new iterative method was achieved in which there is no need to calculate Adomian polynomials, which require so much computational time for higher-order approximations. We have implemented this method for the solutions of different types of nonlinear pantograph equations to support the proposed analysis.


Author(s):  
Hajar Maseeh Yasin ◽  
Adnan Mohsin Abdulazeez

Image compression is an essential technology for encoding and improving various forms of images in the digital era. The inventors have extended the principle of deep learning to the different states of neural networks as one of the most exciting machine learning methods to show that it is the most versatile way to analyze, classify, and compress images. Many neural networks are required for image compressions, such as deep neural networks, artificial neural networks, recurrent neural networks, and convolution neural networks. Therefore, this review paper discussed how to apply the rule of deep learning to various neural networks to obtain better compression in the image with high accuracy and minimize loss and superior visibility of the image. Therefore, deep learning and its application to different types of images in a justified manner with distinct analysis to obtain these things need deep learning.


Author(s):  
N.R. Zaynalov ◽  
U.Kh. Narzullaev ◽  
A.N. Muhamadiev ◽  
I.R. Rahmatullaev ◽  
R.K. Buranov

Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times. For example, there is a known method of hiding a written message: the slave's head was shaved, a message was written on the scalp, and after the hair grew back, the slave was sent to the addressee. From detective works, various methods of secret writing between the lines of ordinary text are well known: from milk to complex chemical reagents with subsequent processing. Digital steganography is based on hiding or embedding additional information in digital objects while causing some distortion of these objects. In this case, text, images, audio, video, network packets, and so on can be used as objects or containers. To embed a secret message, steganographic methods rely on redundant container information or properties that the human perception system cannot distinguish. Recently, there has been a lot of research in the field of hiding information in a text container, since many organizations widely use text documents. Based on this, here the MS Word document is considered as a medium of information. MS Word documents have different parameters, and by changing these parameters or properties, you can achieve data embedding. In the same article, we present steganography using invisible Unicode characters of the Space type, but with a different encoding.


Author(s):  
Teodora Elena Fogoroş ◽  
Mihaela Maftei ◽  
Gabriela Elena Biţan ◽  
Bastian L. Kurth

AbstractThis paper highlights the main elements of a doctoral research regarding the efficiency of workers evaluation process in the workplace. Based on the global competition, organizations are in continuous quality improvement of their processes to stay competitive. The focus is on motivating and constantly offering constructive feedback to the employees by evaluating them on the following criteria: job description requirements, operational objectives and behavioral objectives. The aim of this study is to confirm that in the context of digitization, both evaluation based on objectives and 360-degree evaluation have its advantages and disadvantages and to analyze the impact of it in organization’s performance. Since this process is divided in two parts (mid-year review and final review), an interesting research question would be how useful is to offer feedback to employees at the middle of the evaluation period and its impact on the final review. The first part of the paper will focus on defining the evaluation process and its scope, pursue by an analysis of 360-degree evaluation, evaluation based on objectives, and the evaluation process in the digital era. It would be a challenge to discover the inclination of organizations for different types of evaluations as well as perception differences between employees and employers. Many researches consider that one of the used methods implemented in companies is the evaluation based on objectives. A larger documentation on this subject would delimit the types of evaluations to help companies to easily choose the type that fits its culture. For this purpose, we will perform an outline on the existing literature by analyzing authors’ opinions on this subject and identifying advantages and disadvantages of the two types of evaluation specified above.


Sign in / Sign up

Export Citation Format

Share Document