Results 1 to 10 of about 9,838,902 (340)
Information hiding-a survey [PDF]
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or ...
Fabien A. P. Petitcolas+2 more
semanticscholar +4 more sources
Quiz Games as a model for Information Hiding [PDF]
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.
Bank, Bernd+5 more
core +7 more sources
Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems. [PDF]
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain.
El Azzaoui A+4 more
europepmc +2 more sources
Information hiding based on Augmented Reality
Information hiding aims to achieve secret communication via certain carrier. However, these carrier-based methods often have different kinds of deficiencies.
Chuanlong Li , Xingming Sun, Yuqian Li
doaj +5 more sources
Text information hiding and recovery via wavelet digital watermarking method [PDF]
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj +2 more sources
Separation and information hiding [PDF]
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resources of a module from those accessed by the module's clients. The use of a logical connective gives rise to a form of dynamic partitioning, where we track the transfer of ...
Peter W. O’Hearn+2 more
openalex +6 more sources
Information Hiding Using Minification [PDF]
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj +2 more sources
INFORMATION HIDING IN VIDEO [PDF]
This paper proposes a video information-embedding scheme in which the embedded information is reconstructed without knowing the original host video. The proposed method presents high rate of information embedding and is robust to motion compensated coding, such as MPEG-II and MPEG-III.
Yousef B. Mahdy, Mohammed A. Atiea
openalex +3 more sources
Using Fractals in Information Hiding [PDF]
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj +2 more sources
Protecting the Color Information by Hiding it [PDF]
Few work have been proposed for image color protection. A color protection algorithm should give some comprehensive information about the image (such as its grey-level version) but should hide securely the color information. The proposed algorithms are thus specific but take into account recent signal processing concepts such as quantization ...
Marc Chaumont, William Puech
openalex +5 more sources