Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,192,734 papers from all fields of science
Search
Sign In
Create Free Account
Hidden text
Hidden text is computer text that is displayed in such a way as to be invisible or unreadable. Hidden text is most commonly achieved by setting the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Comment (computer programming)
Computer
Honeypot (computing)
Internet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
RGB Model Based Image Enhancement Technique for Steganography
Advait Gopal Ranade
,
Sweta Dargad
,
Krupali Mistry
International Conference on Computing…
2018
Corpus ID: 53012415
A color image is constructed of various arrays of the same scene, one for every spectral component. These grey level image gives…
Expand
2018
2018
Gender and Age Prediction Multilingual Author Profiles Based on Comments
Ali Nemati
Fire
2018
Corpus ID: 54532292
Recently, several approaching been presented to detect automatically users’ age and gender classification from multiple languages…
Expand
2017
2017
Enhanced Image Watermarking Technique using Wavelets and Interpolation
Sandeep Kaur
,
Himanshu Jindal
2017
Corpus ID: 53462200
Image provides complete detailed information for thing or object. It is considered as an important aspect of analyzing the…
Expand
2015
2015
Study on aesthetic psychology of the Chinese Ancient Novels
Weihong Zhang
2015
Corpus ID: 56339382
The aesthetic psychology of Chinese ancient novels is closely related to the aesthetic consciousness of the subject. The…
Expand
2011
2011
Hiding Data in Audio Using Audio Steganography
P. Yadav
,
V. Shree
,
K. Padmapriya
2011
Corpus ID: 2400578
-Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the…
Expand
2011
2011
Implementation of ISS - IHAS (Information Security System - Information Hiding in Audio Signal) mode
R. Venkateswaran
,
V. Sundaram
2011
Corpus ID: 41429290
This paper shows the possibility of exploiting the features of E- cipher method by using both cryptography and Information hiding…
Expand
2009
2009
Efficient Search in Hidden Text of Large DjVu Documents
Janusz S. Bień
NLP4DL/AT4DL
2009
Corpus ID: 3095526
The paper describes an open-source tool which allows to present end-users with results of advanced language technologies. It…
Expand
2008
2008
STUDENT ACADEMIC PERFORMANCE IN SKILLS-BASED TECHNOLOGY COURSES DELIVERED THROUGH DIFFERENT SCHEDULING FORMATS
Sean E Scott
2008
Corpus ID: 59796851
................................................................................................................ ii…
Expand
2003
2003
Scalable Exploitation of , and Responses to Information Leakage Through Hidden Data in Published Documents
S. Byers
2003
Corpus ID: 16321302
In considering the leakage of information through hidden text mechanisms in commonly used information interchange formats we…
Expand
2002
2002
Electronic Document Publishing Using DjVu
Artem Mikheev
,
L. Vincent
,
M. Hawrylycz
,
L. Bottou
International Workshop on Document Analysis…
2002
Corpus ID: 2334462
Online access to complex compound documents with client side search and browsing capability is one of the key requirements of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE