Results 21 to 30 of about 38,413 (310)

Why and When Do Employees Hide Their Knowledge?

open access: yesBehavioral Sciences, 2022
This study establishes a theoretical and integrative framework for analyzing the relationship between knowledge hiding and task performance. The existing literature indicates that knowledge hiding is prominent in service sector firms and impedes ...
Jovi Sulistiawan   +3 more
doaj   +1 more source

Robust Lossless Semi Fragile Information Protection in Images [PDF]

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2014
Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message.
Pushkar Dixit   +2 more
doaj   +1 more source

Reversible data hiding: Advances in the past two decades

open access: yesIEEE Access, 2016
In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible data hiding, has gradually become a very active research area in the field of data hiding.
Yun-Qing Shi   +4 more
doaj   +1 more source

Effect of Interpersonal Injustice on Knowledge Hiding Behavior: Moderating Role of High-Performance Work Stress

open access: yesFrontiers in Psychology, 2022
The underlying aim of this study was to investigate the impact of interpersonal injustice on emotional exhaustion and the three main facets of knowledge hiding, i.e., evasive knowledge hiding, playing dumb, and rationalized knowledge hiding.
Yi Cao
doaj   +1 more source

Information Hiding Using Minification

open access: yesIEEE Access, 2021
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj   +1 more source

ON DATA HIDING USING DOMAIN SPECIFIC HIERARCHICAL DATA STRUCTURE SVDAG FOR GEOMETRY REPRESENTATION OF VOXELIZED THREEDIMENSIONAL SCENES [PDF]

open access: yesActa Electrotechnica et Informatica, 2020
The paper deals with the problematics of data hiding into domain specific hierarchical data structures which are dedicated to the geometry of the voxelized three-dimensional scenes representation.
Branislav MADOŠ, Zuzana BILANOVÁ
doaj   +1 more source

Structured Medical Pathology Data Hiding Information Association Mining Algorithm Based on Optimized Convolutional Neural Network

open access: yesIEEE Access, 2020
When using traditional algorithms to mine the association of hiding information in medical pathological data, there are some problems, such as low recognition rate of association and poor accuracy of mining results.
Xiaofeng Li, Yanwei Wang, Gang Liu
doaj   +1 more source

Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force

open access: yesFrontiers in Psychology, 2021
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among sales force of insurance companies in Pakistan. The paper also strives to
Rana Faizan Gul   +7 more
doaj   +1 more source

An Algorithm for Data Hiding in Binary Images [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2008
In this work a new data hiding algorithm for binary images is used. In this algorithm the pixels which can be flipped without introducing noticeable artifacts are identified at first by using some rules that examine the neighbors of the central pixels in
Eman Sedeek Al-obaidy
doaj   +1 more source

Advanced Reversible Data Hiding With Encrypted Data [PDF]

open access: yesInternational Journal of Engineering Trends and Technology, 2014
4 pages, 10 figures, Published with International Journal of Engineering Trends and Technology (IJETT)
Sreekumar, Shilpa, Salam, Vincy
openaire   +2 more sources

Home - About - Disclaimer - Privacy