Results 61 to 70 of about 320,607 (275)

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Pyramidal Structures on Yttria‐Stabilized Zirconia after High Temperature Exposure at 1500°C: New Features on an Old Material

open access: yesAdvanced Engineering Materials, EarlyView.
New features on yttria‐stabilized zirconia after exposure at 1500°C: Newly discovered pyramidal structures on an old material. After exposure at 1550°C on the cross section of YSZ new features, namely pyramidal structures are discovered. These structures grow with time, increase in numbers, appear as singularities, are often arranged in strings, and ...
Doris Sebold   +2 more
wiley   +1 more source

Dark triad and knowledge hiding in firms: Mediating role of perceived organizational politics

open access: yesActa Psychologica
Negative behaviors at the workplace always disturb the management of the firms. This research investigates the link between the dark triad and various types of Knowledge hiding (Evasive hiding, Playing dumb, and Rationalized hiding) in firms. In addition,
Yiyu Wang   +3 more
doaj   +1 more source

UNDERSTANDING NARCISSISTS’ KNOWLEDGE HIDING BEHAVIOUR: A MORAL DISENGAGEMENT MECHANISM PERSPECTIVE

open access: yesReviews of Management Sciences, 2021
Purpose:  Narcissistic people have a strong desire to hold focus only around themselves. Their self-love triggers them to create their monopoly and involve in deviant behavioral outcomes such as knowledge hiding.
Nasira Jabeen, Muhammad Anwar ul Haq
doaj   +1 more source

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

open access: yesIEEE Transactions on Circuits and Systems for Video Technology, 2011
Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding.
Esen, Ersin, Alatan, A. Aydin
openaire   +2 more sources

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In recent years, reversible data hiding technology has been widely used in JPEG images for special purposes such as file management and image authentication.
Ben He   +4 more
doaj   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2017
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj   +1 more source

Data Hiding Through Media Audio [PDF]

open access: yes, 2017
Audio watermarking can use with various ways. Firstly, it have used for proving of ownership, production of information, copyright information in a form of a watermark, and it have routed directly in the recording.
Khairani, Sumi
core   +1 more source

Home - About - Disclaimer - Privacy