Please use this identifier to cite or link to this item: https://elib.belstu.by/handle/123456789/24542
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShutko, Nadya-
dc.date.accessioned2018-03-04T10:00:19Z-
dc.date.available2018-03-04T10:00:19Z-
dc.date.issued2016-
dc.identifier.citationShutko, N. The use of aprosh and kerning in text steganography / N. Shutko // PRZEGLĄD ELEKTROTECHNICZNY. - 2016. - № 10.- p. 222-225ru
dc.identifier.urihttps://elib.belstu.by/handle/123456789/24542-
dc.descriptionThe specifics of algorithmic and software implementation of the steganographic methods that are used to protect of digital documents against unauthorized use are analyzed in this paper. The secret information is embedded in the document-container on the basis of the modification of the parameters of the text characters, such as aprosh and kerning. The efficiency of these methods in comparison with some known methods of syntactic text steganography is analyzed.ru
dc.subjectcopyrightru
dc.subjecttext steganographyru
dc.subjectaproshru
dc.subjectkerning pairsru
dc.titleThe use of aprosh and kerning in text steganographyru
dc.typeArticleru
dc.identifier.DOIdoi:10.15199/48.2016.10.51-
Appears in Collections:Статьи в зарубежных изданиях

Files in This Item:
File Description SizeFormat 
Shutko.pdf342 kBAdobe PDFView/Open



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.