National Repository of Grey Literature 37 records found  beginprevious28 - 37  jump to record: Search took 0.02 seconds. 
Environment for Lifting
Kubový, Jan ; Pelikán, Josef (advisor) ; Lokoč, Jakub (referee)
The aim of the thesis is to create a library that will provide ease way to cre- ating and experimenting with computing networks. The concpet of computing netowork can be explained as algorithms whitch can be devided into small simple parts (nodes). The main focus of this library is to easily experiment with trans- formations based on lifting. There are inverse operations for these connections, which are used for lossless compression of data or signal. Emphasis was put on the simplicity of creating new nodes and subsequent connections. An integral part of the work is also an example of several transformations based on lifting.
Environment for Lifting
Kubový, Jan ; Pelikán, Josef (advisor) ; Yaghob, Jakub (referee)
The aim of the thesis is to create a library that will provide ease way to cre- ating and experimenting with computing networks. The concpet of computing netowork can be explained as algorithms whitch can be devided into small simple parts (nodes). From these nodes the computing netowork can be build. Examples of such computational units are cryptographic algorithms. Most important com- puting network are these where exist inverse operations. Especially lifting-based transformations are important. The main emphasis of this work is on the sim- plicity of creating new nodes follows by sipmle nodes connecting. Versatility is another important feature in working with this library. This library will be used to easily implement and experiment with the various computing networks.
Covering sets in steganography
Vacek, Jan ; Holub, Štěpán (advisor) ; Hojsík, Michal (referee)
Steganography is a science which is interested in communication hiding. This work is focused on the most recent methods related to this topic. Mainly, it is matrix embedding, which uses coding theory, and sum and difference covering sets (SDCS). Rainbow coloring of grid graphs is used to receive even better results. This technique decrease amplitude of performed changes. It makes stegosystems less likely to be detected. Properties which describe behavior of each stegosystem are included for each technique. 1
Selected encyption methods
MILICHOVSKÁ, Eva
The aim of this thesis is introduction into issues of classical cryptology from its beginnings in the antiquity to the half of the 20th century. Further, the division of basic ciphers on substitutional and transpositional ones is stated. Only the most important ciphers were chosen from the large number and demonstrations of decipherment were stated here, too. Then, the way of decipherment of Vigen?r´s "indecipherable" cipher is showed here.
Invisible watermarking of digital signals
Pacura, Dávid ; Horák, Karel (referee) ; Petyovský, Petr (advisor)
Cílem téhle práce je navrhnutí nových technik pro robustní neviditelné značení digitálních signálů. Nejdříve je prezentován současný stav tohoto odvětví a dostupné softwarové řešení. Poté následuje návrh několika algoritmů pro neviditelné značení, přičemž každý z nich je založen na jiném principu. Dále je připravena sada digitálních testovacích signálů společně s testovacím softwarem pro otestování navržených řešení a jejích porovnání s vybraným dostupným softwarem. Poté následuje srovnání naměřených výsledků, výkonu a jejích diskuze.
Steganography
Podhorský, Jiří ; Kubíček, Radek (referee) ; Zemčík, Pavel (advisor)
This bachelor project focuses on steganography and presents new modifications of known metods steganography and their implementation. It also presents implementation of adaptive metod Neighbours, for comparison. Both of the metods are based on the "Least Significant Bit" exploitation. It is also demonstrated that newly proposed modification can be used in other metods of steganography. The purpose of proposed method is to encode a secret information into the digital image so that the information is not easily detectable.
Hiding Data in Computer Networks
Hrebíček, Martin ; Halfar, Patrik (referee) ; Polčák, Libor (advisor)
This diploma thesis deals with hiding data in the Internet traffic. It contains a description of the law interception. Various possibilities of hiding data are mentioned. The practical part of this thesis consists of an application that hides the data of HTTP and HTTPS protocols in a fake VoIP call. The application consists of two parts: a client and a server. Data transmitted between the client and the server parts are masked as multimedia data of the VoIP call. When a user or Internet server does not transmit any data, random data are transmitted between client and server parts in order to simulate the VoIP call. Then, the thesis focuses on detection of the attack.
A Hidden GNU/Linux File System
Pavlásek, Martin ; Smrčka, Aleš (referee) ; Lengál, Ondřej (advisor)
Some sensitive data need such a way of hiding that hides not only the content of the data but its preserve itself. The goal of this Bachelor's thesis is to create a file system that enables hiding of files with sensitive data to other files. This text contains an overview of principles used in current file systems and a description of the structure and use of the FUSE technology. Further, the work describes the design of a filesystem that hides files into ID3 tags of MP3 music files and it's implementation in C++. The created filesystem is experimentally assessed and evaluated.
Steganographic Application for Mobile Devices
Beran, David ; Janča, Radim (referee) ; Malinka, Kamil (advisor)
This paper discusses selection of suitable steganographic method for mobile platform and its implementation. F4 method was selected and implemented as an application Stego and its extension Reveal for iOS devices.
Software for data hiding in image files
Morkus, Filip ; Říha, Kamil (referee) ; Burda, Karel (advisor)
In my master's thesis I start fromthedescriptionofthebasics and thebeginningsofsteganography, itsmethods and purposes. Detaileddescriptionof BMP fileswithhidden data follows. A filestructureisanalysedintothesmallestdetails to avoiddamagingfilewhilehiding. At thesametime to make profit oftheinformationincluded in a fileheader in the most effectiveway. Anotheraimwas to explain a principalofsteganographicalmethoditself, usedforhiding data into BMP file. Based on these findings, a programmeconceptwasdesigned and consequentlythatprogrammewas made. Itcarriesoutthehiding and revealing data intothe image files. Directionsfor use are made to thisprogramme and thereisalso a demo ofthefeaturesdescribingeach step. At the end ofmymaster's thesis anattentionispaid to thoseinfluencesthatcanbelimitingforthismethod. Exceeding these limitswouldlead to breakingthesteganographicalmethod, whichmeansrevealingthehidden data.

National Repository of Grey Literature : 37 records found   beginprevious28 - 37  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.