Results 31 to 40 of about 320,607 (275)
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among sales force of insurance companies in Pakistan. The paper also strives to
Rana Faizan Gul +7 more
doaj +1 more source
Information Hiding Using Minification
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj +1 more source
Reversible data hiding in JPEG images based on adjustable padding [PDF]
In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source
An Algorithm for Data Hiding in Binary Images [PDF]
In this work a new data hiding algorithm for binary images is used. In this algorithm the pixels which can be flipped without introducing noticeable artifacts are identified at first by using some rules that examine the neighbors of the central pixels in
Eman Sedeek Al-obaidy
doaj +1 more source
An area law for entanglement from exponential decay of correlations [PDF]
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann +39 more
core +2 more sources
Information hiding is an important technique for information security, which is wildly studied by researchers. Recently embedding methods are proposed in spatial, frequency and other domains.
Yu Zhang +4 more
doaj +1 more source
Quantum nonlocality in the presence of superselection rules and data hiding protocols [PDF]
We consider a quantum system subject to superselection rules, for which certain restrictions apply to the quantum operations that can be implemented. It is shown how the notion of quantum-nonlocality has to be redefined in the presence of superselection ...
A. Galindo +5 more
core +2 more sources
Robust Lossless Semi Fragile Information Protection in Images
Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message.
Pushkar Dixit +2 more
doaj +1 more source
Advanced Reversible Data Hiding With Encrypted Data [PDF]
4 pages, 10 figures, Published with International Journal of Engineering Trends and Technology (IJETT)
Sreekumar, Shilpa, Salam, Vincy
openaire +2 more sources
Knowledge hiding and individual task performance: The role of individual creativity as mediator
This study investigates the association of knowledge hiding with individual task performance and the mediation role of individual creativity. It focuses on how employees' knowledge-hiding behavior can influence their task performance and how individual ...
Ika Atma Kurniawanti +3 more
doaj +1 more source

