مقاله انگلیسی رایگان در مورد روش ساخت شبکه الکترونیکی – IEEE 2019

مقاله انگلیسی رایگان در مورد روش ساخت شبکه الکترونیکی – IEEE 2019

 

مشخصات مقاله
ترجمه عنوان مقاله یک روش ساخت شبکه الکترونیکی بر اساس پد بازی
عنوان انگلیسی مقاله An Electronic Lattice Construction Method Based on Game Padding
انتشار مقاله سال ۲۰۱۹
تعداد صفحات مقاله انگلیسی ۱۰ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه IEEE
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
۴٫۶۴۱ در سال ۲۰۱۸
شاخص H_index ۵۶ در سال ۲۰۱۹
شاخص SJR ۰٫۶۰۹ در سال ۲۰۱۸
شناسه ISSN ۲۱۶۹-۳۵۳۶
شاخص Quartile (چارک) Q2 در سال ۲۰۱۸
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های مرتبط شبکه های کامپیوتری
نوع ارائه مقاله
ژورنال
مجله / کنفرانس دسترسی – IEEE Access
دانشگاه  College of Computer Science and Technology, Qingdao University, Qingdao 266071, China
کلمات کلیدی  پنهان سازی اطلاعات، پنهان نگاری متن بدون پوشش، پد بازی، شبکه الکترونیکی، مسیرهای پنهان
کلمات کلیدی انگلیسی  Information hiding, coverless text steganography, padding game, electronic lattice, hidden paths
شناسه دیجیتال – doi
https://doi.org/10.1109/ACCESS.2019.2946299
کد محصول  E13846
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
I. Introduction
II. Related Works
III. Steganography Algorithm Based on an Electronic Lattice
IV. The Analyses
V. Conclusion
Authors
Figures
References

 

بخشی از متن مقاله:
Abstract

The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity problems to some extent. We propose an electronic lattice construction method based on a padding game to hide a secret message. This method first computes the length of a secret message and a key is worked out based on the length; the walking rule, the constraints to a hidden path, the initial size of a grid and the starting cell are determined based on the key and a unique hidden path can be figured out for the given secret; then the secret message is stored in the cells along the unique path and all the remaining cells in the grid are filled according to the padding game rules, which helps to obscure that secret message; finally, elements in some cells are removed to get the crossword that will be shared with the receiver. To extract the message, the receiver fills the crossword according to the same game rules as the sender does, and calculates that unique hidden path based on the shared key. The experimental results and analyses show that its concealment is prominent, its steganography success rate is 100%, and it has a high steganographic capacity. It also has no readability issue as the steganography by generation usually does.

Introduction

With the rapid development of Internet technology, the dissemination of digital audio-visual products and other electronic publications become more and more convenient. Just as a coin has two sides, besides such facilitation, the new technologies also bring a lot of problems, such as information theft and disclosure, and other serious infringements. It has become a problem of great concern on how to make people not only enjoy the convenience but also effectively protect information security and digital rights. Information hiding technology [1] is one of potential approaches to these issues, one branch of which, i.e. steganography, is the practice of communicating a secret message by hiding it in a popular cover object. This approach can avoid the secret transmission to be noticed by an attacker and is attracting more and more attention. It plays an important role in protecting the information from uncovering, such as the secret communication. Based on the cover types, steganography can be divided into five categories: image steganography [2], [3], video steganography [4], [5], audio steganography [6]–[۸], text steganography [9] and network steganography [10]. As the most important and predominant media, a text is widely used in our daily life and work. This makes it difficult to arouse suspicion when a text is used as a cover, which conforms to the principal characteristics of a cover [11]. The text steganography was invented in ancient times. The most typical ones were the Tibetan head poems and the Tibetan tail poems [12].

ثبت دیدگاه