Results 31 to 40 of about 320,607 (275)

Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force

open access: yesFrontiers in Psychology, 2021
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among sales force of insurance companies in Pakistan. The paper also strives to
Rana Faizan Gul   +7 more
doaj   +1 more source

Information Hiding Using Minification

open access: yesIEEE Access, 2021
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj   +1 more source

Reversible data hiding in JPEG images based on adjustable padding [PDF]

open access: yes, 2017
In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

An Algorithm for Data Hiding in Binary Images [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2008
In this work a new data hiding algorithm for binary images is used. In this algorithm the pixels which can be flipped without introducing noticeable artifacts are identified at first by using some rules that examine the neighbors of the central pixels in
Eman Sedeek Al-obaidy
doaj   +1 more source

An area law for entanglement from exponential decay of correlations [PDF]

open access: yes, 2013
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann   +39 more
core   +2 more sources

Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance

open access: yesIEEE Access, 2020
Information hiding is an important technique for information security, which is wildly studied by researchers. Recently embedding methods are proposed in spatial, frequency and other domains.
Yu Zhang   +4 more
doaj   +1 more source

Quantum nonlocality in the presence of superselection rules and data hiding protocols [PDF]

open access: yes, 2003
We consider a quantum system subject to superselection rules, for which certain restrictions apply to the quantum operations that can be implemented. It is shown how the notion of quantum-nonlocality has to be redefined in the presence of superselection ...
A. Galindo   +5 more
core   +2 more sources

Robust Lossless Semi Fragile Information Protection in Images

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2014
Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message.
Pushkar Dixit   +2 more
doaj   +1 more source

Advanced Reversible Data Hiding With Encrypted Data [PDF]

open access: yesInternational Journal of Engineering Trends and Technology, 2014
4 pages, 10 figures, Published with International Journal of Engineering Trends and Technology (IJETT)
Sreekumar, Shilpa, Salam, Vincy
openaire   +2 more sources

Knowledge hiding and individual task performance: The role of individual creativity as mediator

open access: yesHeliyon, 2023
This study investigates the association of knowledge hiding with individual task performance and the mediation role of individual creativity. It focuses on how employees' knowledge-hiding behavior can influence their task performance and how individual ...
Ika Atma Kurniawanti   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy