National Repository of Grey Literature 35 records found  beginprevious21 - 30next  jump to record: Search took 0.01 seconds. 
Digital Steganography for Executables
Tobiáš, Pavel ; Bidlo, Michal (referee) ; Strnadel, Josef (advisor)
This bachelor's thesis concerns itself with steganographic concealment of arbitrary data in executable files . Initially it speaks in general terms , mainly about injection - and substitution - based steganographic methods for various types of cover - objects . Afterwards , the focus is on executable files in the ELF format and the x86 ISA family ; permutation - based methods for instructions and basic block chains are mentioned and the substitution - based method of instruction equivalence classes is examined . Consequently , the design, implementation , testing and optimization of a custom solution based on the last mentioned method are described . Finally , the methods and outcomes of experimenting with the custom solution are described .
Digital Image Steganography
Mazánek, Antonín ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
This bachelor's thesis introduces the steganography scientific discipline. It presents its ancient and relative recent history, mentions its current use and outlines the possible directions for steganography future. It introduces steganography into context of hiding information superior domain and highlights differences between other methods in this domain. It describes steganography subdivisions and closer deals with digital image steganography. It presents some known methods and types of digital image data. The thesis also contains more detailed description of image data in PNG format. It describes the implementation of LSB and PVD steganography methods with images in PNG format as cover object and evaluates their key properties, namely: imperceptibility, capacity and robustness. At the end of the thesis, the author's reflection on the results and possibilities of further modifications of the mentioned methods is given. 
Digital Audio Steganography
Morávek, Jan ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
Nowadays much more information is transfered and saved in electronic files. The digitalization allows easier access to information, not only for the user, but also for a possible attacker. This fact leads to progress in information security area. Besides cryptography, this also includes steganography. This thesis is focused on steganography in general and describes digital audio steganography in detail. Implementation and evaluation of several methods are also parts of this thesis.
Lego Technic encryption demonstrator
Jančík, Jakub ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
The bachelor thesis is mostly about mechanical encryption. Primary task was to build demonstrator encryptor using only LEGO Technic building kit, which would allow polyalphabetical substitution encryption. The theoretical part includes information about origins of steganography, cryptography and cryptanalysis, it explains the process of the polyalphabetical substitution encryption and it will introduce Enigma – how it went on during development, on what principle it works and thanks to what it stopped being safe. Device was extended with LEGO MINDSTORMS which allowed to build the Enigma demonstrator.
Environment for Lifting
Kubový, Jan ; Pelikán, Josef (advisor) ; Lokoč, Jakub (referee)
The aim of the thesis is to create a library that will provide ease way to cre- ating and experimenting with computing networks. The concpet of computing netowork can be explained as algorithms whitch can be devided into small simple parts (nodes). The main focus of this library is to easily experiment with trans- formations based on lifting. There are inverse operations for these connections, which are used for lossless compression of data or signal. Emphasis was put on the simplicity of creating new nodes and subsequent connections. An integral part of the work is also an example of several transformations based on lifting.
Environment for Lifting
Kubový, Jan ; Pelikán, Josef (advisor) ; Yaghob, Jakub (referee)
The aim of the thesis is to create a library that will provide ease way to cre- ating and experimenting with computing networks. The concpet of computing netowork can be explained as algorithms whitch can be devided into small simple parts (nodes). From these nodes the computing netowork can be build. Examples of such computational units are cryptographic algorithms. Most important com- puting network are these where exist inverse operations. Especially lifting-based transformations are important. The main emphasis of this work is on the sim- plicity of creating new nodes follows by sipmle nodes connecting. Versatility is another important feature in working with this library. This library will be used to easily implement and experiment with the various computing networks.
Covering sets in steganography
Vacek, Jan ; Holub, Štěpán (advisor) ; Hojsík, Michal (referee)
Steganography is a science which is interested in communication hiding. This work is focused on the most recent methods related to this topic. Mainly, it is matrix embedding, which uses coding theory, and sum and difference covering sets (SDCS). Rainbow coloring of grid graphs is used to receive even better results. This technique decrease amplitude of performed changes. It makes stegosystems less likely to be detected. Properties which describe behavior of each stegosystem are included for each technique. 1
Selected encyption methods
MILICHOVSKÁ, Eva
The aim of this thesis is introduction into issues of classical cryptology from its beginnings in the antiquity to the half of the 20th century. Further, the division of basic ciphers on substitutional and transpositional ones is stated. Only the most important ciphers were chosen from the large number and demonstrations of decipherment were stated here, too. Then, the way of decipherment of Vigen?r´s "indecipherable" cipher is showed here.
Invisible watermarking of digital signals
Pacura, Dávid ; Horák, Karel (referee) ; Petyovský, Petr (advisor)
Cílem téhle práce je navrhnutí nových technik pro robustní neviditelné značení digitálních signálů. Nejdříve je prezentován současný stav tohoto odvětví a dostupné softwarové řešení. Poté následuje návrh několika algoritmů pro neviditelné značení, přičemž každý z nich je založen na jiném principu. Dále je připravena sada digitálních testovacích signálů společně s testovacím softwarem pro otestování navržených řešení a jejích porovnání s vybraným dostupným softwarem. Poté následuje srovnání naměřených výsledků, výkonu a jejích diskuze.
Steganography
Podhorský, Jiří ; Kubíček, Radek (referee) ; Zemčík, Pavel (advisor)
This bachelor project focuses on steganography and presents new modifications of known metods steganography and their implementation. It also presents implementation of adaptive metod Neighbours, for comparison. Both of the metods are based on the "Least Significant Bit" exploitation. It is also demonstrated that newly proposed modification can be used in other metods of steganography. The purpose of proposed method is to encode a secret information into the digital image so that the information is not easily detectable.

National Repository of Grey Literature : 35 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.