Results 11 to 20 of about 9,838,902 (340)
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou+4 more
doaj +2 more sources
Behavioral abstraction is hiding information
AbstractWe show that for any behavioral Σ-specification B there is an ordinary algebraic specification B˜ over a larger signature, such that a model behaviorally satisfies B iff it satisfies, in the ordinary sense, the Σ-theorems of B˜. The idea is to add machinery for contexts and experiments (sorts, operations and equations), use it, and then hide it.
Grigore Roşu
openalex +3 more sources
Digital Information Hiding Techniques [PDF]
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where ...
Alyaa Abdul Majeed Haleem+1 more
doaj +2 more sources
Probability of Error in Information-Hiding Protocols [PDF]
Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the inference when ...
Konstantinos Chatzikokolakis+2 more
openalex +5 more sources
Anonymity and Information Hiding in Multiagent Systems [PDF]
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework ...
Halpern, Joseph Y., O'Neill, Kevin R.
core +11 more sources
Hiding Information in Retransmissions
12 pages, 12 figures, 6 ...
Wojciech Mazurczyk+2 more
openalex +4 more sources
Information Hiding and Attacks : Review [PDF]
Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.
Richa Gupta
openalex +6 more sources
Active hiding of social information from information-parasites [PDF]
Coevolution between pairs of different kind of entities, such as providers and users of information, involves reciprocal selection pressures between them as a consequence of their ecological interaction. Pied flycatchers (Ficedula hypoleuca) have been shown to derive fitness benefits (larger clutches) when nesting in proximity to great tits (Parus ...
Olli J. Loukola+3 more
openalex +6 more sources
Coverless Information Hiding Method Based on Web Text
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long+4 more
doaj +2 more sources
A scheme of hiding large-size image into small-size image based on FCdDNet [PDF]
The hiding capacity of the current information hiding field has reached a relatively high level, which can hide two color images into one color image. In order to explore a larger hidden capacity, an information hiding scheme based on an improved FCdDNet
Lianshan Liu+3 more
doaj +3 more sources