Results 21 to 30 of about 320,607 (275)

Effect of Interpersonal Injustice on Knowledge Hiding Behavior: Moderating Role of High-Performance Work Stress

open access: yesFrontiers in Psychology, 2022
The underlying aim of this study was to investigate the impact of interpersonal injustice on emotional exhaustion and the three main facets of knowledge hiding, i.e., evasive knowledge hiding, playing dumb, and rationalized knowledge hiding.
Yi Cao
doaj   +1 more source

Quantum data hiding in the presence of noise [PDF]

open access: yes, 2016
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core   +3 more sources

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

Reversible data hiding: Advances in the past two decades

open access: yesIEEE Access, 2016
In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible data hiding, has gradually become a very active research area in the field of data hiding.
Yun-Qing Shi   +4 more
doaj   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

ON DATA HIDING USING DOMAIN SPECIFIC HIERARCHICAL DATA STRUCTURE SVDAG FOR GEOMETRY REPRESENTATION OF VOXELIZED THREEDIMENSIONAL SCENES [PDF]

open access: yesActa Electrotechnica et Informatica, 2020
The paper deals with the problematics of data hiding into domain specific hierarchical data structures which are dedicated to the geometry of the voxelized three-dimensional scenes representation.
Branislav MADOŠ, Zuzana BILANOVÁ
doaj   +1 more source

Quantum data hiding with spontaneous parameter down-conversion [PDF]

open access: yes, 2003
Here we analyze the practical implication of the existing quantum data hiding protocol with Bell states produced with optical downconverter. We show that the uncertainty for the producing of the Bell states with spontaneous parameter down-conversion ...
A. Ekert   +11 more
core   +2 more sources

Structured Medical Pathology Data Hiding Information Association Mining Algorithm Based on Optimized Convolutional Neural Network

open access: yesIEEE Access, 2020
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj   +1 more source

Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]

open access: yes, 2006
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan   +6 more
core   +2 more sources

JPEG steganography with particle swarm optimization accelerated by AVX [PDF]

open access: yes, 2020
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy