Results 1 to 10 of about 24,642,685 (320)

How Knowledge Hiding Increases Public Sector Employees’ Engagement in Political Acts: A Study from the Perspective of Target [PDF]

open access: yesInterdisciplinary Description of Complex Systems
Drawing from Conservation of Resource theory, this study takes target’s perspective on co-workers’ knowledge hiding and its impact on target’s political acts.
Bashir Ahmad   +2 more
doaj   +1 more source

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption

open access: yesIEEE Access, 2018
This paper proposes a high-capacity reversible data hiding scheme for encrypted multimedia data by using Somewhat Homomorphic Encryption. In an image, three adjacent pixels are selected as a group for the whole process.
Lizhi Xiong   +3 more
doaj   +1 more source

HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features

open access: yesIEEE Access, 2019
This paper proposes an innovative and novel steganography method for an AMBTC compressed image by combining a turtle-shell reference matrix and (7, 4) Hamming code, called hybrid strategy and block feature-based data hiding method (HBF-DH).
Zhan Yu   +3 more
doaj   +1 more source

Integrated Association Rules Complete Hiding Algorithms

open access: yesAdvances in Electrical and Electronic Engineering, 2017
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah   +3 more
doaj   +1 more source

A New Robust Data Hiding Method in Digital Image based on Pelican Optimization Algorithm

open access: yesTikrit Journal of Pure Science
Sharing and exchanging data over networks is often insecure, especially if the data is secret and important. Steganography is key research fields in information hiding, focusing on invisible communication and digital steganography, which offers private,
Ebtehal Talib
doaj   +1 more source

Methods of Stegoanalysis

open access: yesБезопасность информационных технологий, 2010
In this paper we consider two different approaches to the methods stegoanalysis applicable to common multimedia formats. The first approach uses the verification and the analysis of changes in the fields of media files that must remain constant ...
A. S. Borsch
doaj  

A Novel 3D Reversible Data Hiding Scheme Based on Integer-Reversible Krawtchouk Transform for IoMT. [PDF]

open access: yesSensors (Basel), 2023
Yamni M   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy