Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,387,118 papers from all fields of science
Search
Sign In
Create Free Account
Hidden text
Hidden text is computer text that is displayed in such a way as to be invisible or unreadable. Hidden text is most commonly achieved by setting the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Comment (computer programming)
Computer
Honeypot (computing)
Internet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
RGB Model Based Image Enhancement Technique for Steganography
Advait Gopal Ranade
,
Sweta Dargad
,
Krupali Mistry
International Conference on Computing…
2018
Corpus ID: 53012415
A color image is constructed of various arrays of the same scene, one for every spectral component. These grey level image gives…
Expand
2018
2018
Gender and Age Prediction Multilingual Author Profiles Based on Comments
Ali Nemati
Fire
2018
Corpus ID: 54532292
Recently, several approaching been presented to detect automatically users’ age and gender classification from multiple languages…
Expand
2017
2017
Enhanced Image Watermarking Technique using Wavelets and Interpolation
Sandeep Kaur
,
Himanshu Jindal
2017
Corpus ID: 53462200
Image provides complete detailed information for thing or object. It is considered as an important aspect of analyzing the…
Expand
2015
2015
Study on aesthetic psychology of the Chinese Ancient Novels
Weihong Zhang
2015
Corpus ID: 56339382
The aesthetic psychology of Chinese ancient novels is closely related to the aesthetic consciousness of the subject. The…
Expand
2011
2011
Hiding Data in Audio Using Audio Steganography
P. Yadav
,
V. Shree
,
K. Padmapriya
2011
Corpus ID: 2400578
-Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the…
Expand
2009
2009
Efficient Search in Hidden Text of Large DjVu Documents
Janusz S. Bień
NLP4DL/AT4DL
2009
Corpus ID: 3095526
The paper describes an open-source tool which allows to present end-users with results of advanced language technologies. It…
Expand
2008
2008
Information hiding in wave files through frequency domain
V. Viswanathan
Applied Mathematics and Computation
2008
Corpus ID: 6084887
2008
2008
STUDENT ACADEMIC PERFORMANCE IN SKILLS-BASED TECHNOLOGY COURSES DELIVERED THROUGH DIFFERENT SCHEDULING FORMATS
Sean E Scott
2008
Corpus ID: 59796851
................................................................................................................ ii…
Expand
Highly Cited
2006
Highly Cited
2006
Visual cryptography with extra ability of hiding confidential data
W. Fang
,
Ja-Chen Lin
J. Electronic Imaging
2006
Corpus ID: 31698961
We present a two-in-one visual cryptography (VC) scheme that not only shares an image of moderate confidentiality between two…
Expand
2003
2003
Scalable Exploitation of , and Responses to Information Leakage Through Hidden Data in Published Documents
S. Byers
2003
Corpus ID: 16321302
In considering the leakage of information through hidden text mechanisms in commonly used information interchange formats we…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE