Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book proposed the creation of a secret key that acts as a roadmap for the embedding process and governs both the selection of hiding locations within the image and the amount of data concealed in each location. Two different approaches were used to generate this key, the first uses Linear Feedback Shift Registers (LFSRs), and the second uses a chaotic dynamic system. Furthermore, the randomness of the generated key was checked using the National Institute of Standards and Technology (NIST) tests to verify the randomness of the key.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.