Results 1 to 10 of about 9,838,902 (340)

Information hiding-a survey [PDF]

open access: greenProceedings of the IEEE, 1999
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or ...
Fabien A. P. Petitcolas   +2 more
semanticscholar   +4 more sources

Quiz Games as a model for Information Hiding [PDF]

open access: bronzeJournal of Complexity, 2015
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.
Bank, Bernd   +5 more
core   +7 more sources

Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems. [PDF]

open access: yesSensors (Basel), 2022
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain.
El Azzaoui A   +4 more
europepmc   +2 more sources

Information hiding based on Augmented Reality

open access: yesMathematical Biosciences and Engineering, 2019
Information hiding aims to achieve secret communication via certain carrier. However, these carrier-based methods often have different kinds of deficiencies.
Chuanlong Li , Xingming Sun, Yuqian Li
doaj   +5 more sources

Text information hiding and recovery via wavelet digital watermarking method [PDF]

open access: yesScientific Reports, 2023
According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from
Zhou Xiaohui
doaj   +2 more sources

Separation and information hiding [PDF]

open access: bronzeProceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2009
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resources of a module from those accessed by the module's clients. The use of a logical connective gives rise to a form of dynamic partitioning, where we track the transfer of ...
Peter W. O’Hearn   +2 more
openalex   +6 more sources

Information Hiding Using Minification [PDF]

open access: yesIEEE Access, 2021
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj   +2 more sources

INFORMATION HIDING IN VIDEO [PDF]

open access: bronzeJES. Journal of Engineering Sciences, 2006
This paper proposes a video information-embedding scheme in which the embedded information is reconstructed without knowing the original host video. The proposed method presents high rate of information embedding and is robust to motion compensated coding, such as MPEG-II and MPEG-III.
Yousef B. Mahdy, Mohammed A. Atiea
openalex   +3 more sources

Using Fractals in Information Hiding [PDF]

open access: diamondEngineering and Technology Journal, 2009
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information hiding using iterated function system (IFS) this approach ...
Nadia M. Al-Saidie, Thanaa A. Kadhim
doaj   +2 more sources

Protecting the Color Information by Hiding it [PDF]

open access: hybrid, 2009
Few work have been proposed for image color protection. A color protection algorithm should give some comprehensive information about the image (such as its grey-level version) but should hide securely the color information. The proposed algorithms are thus specific but take into account recent signal processing concepts such as quantization ...
Marc Chaumont, William Puech
openalex   +5 more sources

Home - About - Disclaimer - Privacy