K. Agbele, L. Olumide, Daniel O. Ekong, Dele Seluwa, A. Onamade
{"title":"基于用户搜索行为的个性化文档相关性排序上下文信息检索模型","authors":"K. Agbele, L. Olumide, Daniel O. Ekong, Dele Seluwa, A. Onamade","doi":"10.4172/0974-7230.S1.012","DOIUrl":null,"url":null,"abstract":"S techniques today are widely used for securing secret information. File types like image, audio, video and text are used for hiding secret information using steganographic techniques. A number of steganographic techniques are available in literature in which least significant bit (LSB) techniques are the most common. In this paper a new technique is demonstrated in which most significant bits (MSB) of pixels are taken into account for hiding secret data bit. In this technique secret data bits are arranged in pairs of two and similarly bits representing pixels are also arranged in pairs. For this purpose the 7th and 6th bits, 6th and 5th bits, 5th and 4th bits, 4th and 3rd bits are arranged to make pairs. The corresponding pairs are numbered as 3rd pair (7th and 6th), 2nd pair (6th and 5th), 1st pair (5th and 4th) and 0th pair (4th and 3rd). For each embedding the secret data bits pair is compared with the pairs of pixel bits and embedding is done on the basis of similarity between pairs. If no similarity is found in pairs then secret data pairs is embedded in 0th pair of pixel bits. The proposed technique ensures significant signal to noise ratio and is more secure than the existing techniques as the attackers mostly target the least significant bits of pixel for extracting secret information and focuses less on most significant bits.","PeriodicalId":23764,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering","volume":"14 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance\",\"authors\":\"K. Agbele, L. Olumide, Daniel O. Ekong, Dele Seluwa, A. Onamade\",\"doi\":\"10.4172/0974-7230.S1.012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"S techniques today are widely used for securing secret information. File types like image, audio, video and text are used for hiding secret information using steganographic techniques. A number of steganographic techniques are available in literature in which least significant bit (LSB) techniques are the most common. In this paper a new technique is demonstrated in which most significant bits (MSB) of pixels are taken into account for hiding secret data bit. In this technique secret data bits are arranged in pairs of two and similarly bits representing pixels are also arranged in pairs. For this purpose the 7th and 6th bits, 6th and 5th bits, 5th and 4th bits, 4th and 3rd bits are arranged to make pairs. The corresponding pairs are numbered as 3rd pair (7th and 6th), 2nd pair (6th and 5th), 1st pair (5th and 4th) and 0th pair (4th and 3rd). For each embedding the secret data bits pair is compared with the pairs of pixel bits and embedding is done on the basis of similarity between pairs. If no similarity is found in pairs then secret data pairs is embedded in 0th pair of pixel bits. The proposed technique ensures significant signal to noise ratio and is more secure than the existing techniques as the attackers mostly target the least significant bits of pixel for extracting secret information and focuses less on most significant bits.\",\"PeriodicalId\":23764,\"journal\":{\"name\":\"World Academy of Science, Engineering and Technology, International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering\",\"volume\":\"14 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"World Academy of Science, Engineering and Technology, International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4172/0974-7230.S1.012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"World Academy of Science, Engineering and Technology, International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/0974-7230.S1.012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance
S techniques today are widely used for securing secret information. File types like image, audio, video and text are used for hiding secret information using steganographic techniques. A number of steganographic techniques are available in literature in which least significant bit (LSB) techniques are the most common. In this paper a new technique is demonstrated in which most significant bits (MSB) of pixels are taken into account for hiding secret data bit. In this technique secret data bits are arranged in pairs of two and similarly bits representing pixels are also arranged in pairs. For this purpose the 7th and 6th bits, 6th and 5th bits, 5th and 4th bits, 4th and 3rd bits are arranged to make pairs. The corresponding pairs are numbered as 3rd pair (7th and 6th), 2nd pair (6th and 5th), 1st pair (5th and 4th) and 0th pair (4th and 3rd). For each embedding the secret data bits pair is compared with the pairs of pixel bits and embedding is done on the basis of similarity between pairs. If no similarity is found in pairs then secret data pairs is embedded in 0th pair of pixel bits. The proposed technique ensures significant signal to noise ratio and is more secure than the existing techniques as the attackers mostly target the least significant bits of pixel for extracting secret information and focuses less on most significant bits.