Results 21 to 30 of about 320,607 (275)
The underlying aim of this study was to investigate the impact of interpersonal injustice on emotional exhaustion and the three main facets of knowledge hiding, i.e., evasive knowledge hiding, playing dumb, and rationalized knowledge hiding.
Yi Cao
doaj +1 more source
Quantum data hiding in the presence of noise [PDF]
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core +3 more sources
Load Hiding of Household's Power Demand [PDF]
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik +2 more
core +1 more source
Reversible data hiding: Advances in the past two decades
In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible data hiding, has gradually become a very active research area in the field of data hiding.
Yun-Qing Shi +4 more
doaj +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
ON DATA HIDING USING DOMAIN SPECIFIC HIERARCHICAL DATA STRUCTURE SVDAG FOR GEOMETRY REPRESENTATION OF VOXELIZED THREEDIMENSIONAL SCENES [PDF]
The paper deals with the problematics of data hiding into domain specific hierarchical data structures which are dedicated to the geometry of the voxelized three-dimensional scenes representation.
Branislav MADOŠ, Zuzana BILANOVÁ
doaj +1 more source
Quantum data hiding with spontaneous parameter down-conversion [PDF]
Here we analyze the practical implication of the existing quantum data hiding protocol with Bell states produced with optical downconverter. We show that the uncertainty for the producing of the Bell states with spontaneous parameter down-conversion ...
A. Ekert +11 more
core +2 more sources
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj +1 more source
Information hiding and retrieval in Rydberg wave packets using half-cycle pulses [PDF]
We demonstrate an information hiding and retrieval scheme with the relative phases between states in a Rydberg wave packet acting as the bits of a data register.
C. Rangan +6 more
core +2 more sources
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source

