Results 11 to 20 of about 320,607 (275)

Large-capacity information hiding scheme based on minimum pixel modification

open access: yesEgyptian Informatics Journal, 2022
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu   +4 more
doaj   +1 more source

Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing

open access: yesApplied Sciences, 2022
Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding.
Haoyang Kang, Lu Leng, Byung-Gyu Kim
doaj   +1 more source

Local-Moment-Driven Robust Reversible Data Hiding

open access: yesApplied Sciences, 2022
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications.
Yash Veer Singh   +3 more
doaj   +1 more source

Workplace conflicts and knowledge hiding: Mediating role of relational psychological contract breach

open access: yesHeliyon, 2023
This study explains workplace conflicts (interpersonal and task-related) as antecedents of knowledge-hiding behaviors. Moreover, a relational psychological contract breach is a mediator between workplace conflicts and knowledge-hiding behavior.
Xiaolong Qiao   +4 more
doaj   +1 more source

Hiding Data Hiding

open access: yes, 2021
https://scholar.google.com/citations?user ...
Wu, Hanzhou, Liu, Gen, Zhang, Xinpeng
openaire   +2 more sources

High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [PDF]

open access: yesJisuanji kexue, 2021
Aiming at the problem of small embedding capacity and low security of reversible data hiding algorithm for audio files,a reversible data hiding(RDH) algorithm for audio files based on code division multiplexing(CDM) is proposed in this paper.The ...
MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing
doaj   +1 more source

Improving preprocessing in reversible data hiding based on contrast enhancement

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
In this paper, we propose an improvement in the preprocessing stage of the reversible data hiding method based on contrast enhancement applied to grayscale digital images. In conventional proposals, the preprocessing stage plays a fundamental role in the
Diana Nuñez-Ramirez   +2 more
doaj   +1 more source

Data Hiding in Sound Using Time Modulation of Unvoiced Blocks [PDF]

open access: yesEngineering and Technology Journal, 2009
This paper is concerned with hiding secret data in audio media file (.WAV). Whenperforming data hiding in audio, one must exploit the weaknesses of Human Auditory System(HAS), while at the same time being a ware of the extreme sensitivity of this system.
Hilal H. Saleh   +2 more
doaj   +1 more source

A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images

open access: yesApplied Sciences, 2022
This paper proposes a novel reversible data-hiding method in encrypted images to achieve both a high hiding capacity and good compression performance. The proposed method can also decrypt marked encrypted images without data extraction, so marked images ...
Ryota Motomura   +2 more
doaj   +1 more source

Why and When Do Employees Hide Their Knowledge?

open access: yesBehavioral Sciences, 2022
This study establishes a theoretical and integrative framework for analyzing the relationship between knowledge hiding and task performance. The existing literature indicates that knowledge hiding is prominent in service sector firms and impedes ...
Jovi Sulistiawan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy