-
1
-
2
Working with Text Files in Python
Published 2012-07-01“…This lesson introduces the use of Python to open and write to text files, including details on methods and functions for doing so.…”
Get full text
Article -
3
Steganography: Text File Hiding in Image
Published 2013“…Through the concept of steganography, this research wishing to hide the text file in the image. The purpose to doing so is to create a steganographic message when only sender and receiver know the trick behind the steganographic message.…”
Get full text
Undergraduates Project Papers -
4
Using DNA to Encode Text Files
Published 2014-07-01“…This research provided a new method to encrypt text files using DNA were building a set of coding tables and using them to obtain the cipher text in DNA form , also used a set of transposition cipher methods for the purpose of increasing the security of the resulted cipher text .…”
Get full text
Article -
5
-
6
-
7
Text File Hiding Randomly Using Secret Sharing Scheme
Published 2018-01-01“…Where it provides two levels of information security through encryptionof a text file using the secret sharing and the generating random positions of hiding.This method has been in hiding a text file and recovered without loss ofinformation, as well as not noticing any deformation of the image. …”
Get full text
Article -
8
Block cipher mode research based on identifier of text files
Published 2017-03-01“…The electronic code book(ECB)mode cannot conceal the data model of the plaintext and has only one private key to the whole plaintext.A block cipher mode based on identity for text files was proposed,which ab-sorbed the advantages of block cipher mode and the feature of plaintext string.A double Hash mapping structure was designed and one layer of the mapping structure maps the plaintext into discontinuous groups,another one which was based on the concept of identify library produced corresponding private key to the plaintext group.The model overcame the discontinuous group and single private key problem and effectively improved the security of the cipher text.The experiment results show that the new model has better security,flexibility and extensibility.…”
Get full text
Article -
9
-
10
Investigate the Capability of Applying Hidden Data in Text File: An Overview
Published 2010“…The steganography technique has been used mainly to hide secret data within multimedia files and one of used files to hide secret data is the text files. In this study, we have proposed the steganography methods using the text files as a review. …”
Article -
11
Search across Different Media: Numeric Data Sets and Text Files
Published 2006-12-01“…Topic searches are described in two different media: text files and socioeconomic numeric databases and also for transverse searching, whereby retrieved text is used to find topically related numeric data and vice versa. …”
Get full text
Article -
12
On the application of wavelet transform and Huffman algorithm to Yorùbá language syntax text files compression
Published 2022-01-01Subjects: “…text file…”
Get full text
Article -
13
...Abdul-Nabi Encryption Color Images and Transferring Resulted Values to Text File ...
Published 2019-05-01“…The proposed method deals with encryption the color image and transfer the resulted values into text file to transfer the image on transmission media in encrypted text file form. …”
Get full text
Article -
14
Design and implementation of the hybrid system for encryption and hiding the text file in the Voice over Internet Protocols.
Published 2011-12-01“…The covert channels of Voice Over Internet Protocol used its type value based spatial channel and active behavior to send the stego-image or text file using )Session Initial Protocol(SIP) Session Description Protocol(SDP) Real-Time Transport Protocol (RTP), Real-Time Transport Control Protocol(RTCP)(. …”
Get full text
Article -
15
Analysis of word occurrence frequency and word association in English text file: A big data analytics method
Published 2018-09-01“…In present study, I presented an algorithm for analysis of word occurrence frequency and word association in English text file. Various delimiters were used for splitting words. …”
Get full text
Article -
16
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices
Published 2019-02-01“…This paper proposes a novel tiny symmetric encryption algorithm (NTSA) which provides enhanced security for the transfer of text files through the IoT network by introducing additional key confusions dynamically for each round of encryption. …”
Get full text
Article -
17
ORFer – retrieval of protein sequences and open reading frames from GenBank and storage into relational databases or text files
Published 2002-12-01“…Sequences are either stored with their features in a relational database or can be exported as text files in Fasta or tabulator delimited format. The ORFer program is freely available at <url>http://www.proteinstrukturfabrik.de/orfer</url>.…”
Get full text
Article -
18
Text Files Compression using Combination of two Dictionary methods (Specific dictionary for specific language and LZ77 Approach)
Published 2011-12-01“…This approach is tested on real text files and verifies it’s successful.…”
Get full text
Article -
19
-
20