Results 11 to 20 of about 9,721,388 (323)

Information hiding based on Augmented Reality

open access: yesMathematical Biosciences and Engineering, 2019
Information hiding aims to achieve secret communication via certain carrier. However, these carrier-based methods often have different kinds of deficiencies.
Chuanlong Li , Xingming Sun, Yuqian Li
doaj   +5 more sources

Information Hiding Using Minification [PDF]

open access: yesIEEE Access, 2021
Information hiding techniques have been recently getting increased attention from the security community. This is because attackers often apply a variety of data hiding methods to exfiltrate confidential information, enable covert transfers between the ...
Pawel Rajba, Wojciech Mazurczyk
doaj   +2 more sources

Digital Information Hiding Techniques [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where ...
Alyaa Abdul Majeed Haleem   +1 more
doaj   +2 more sources

Separation and information hiding [PDF]

open access: bronzeProceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2009
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resources of a module from those accessed by the module's clients. The use of a logical connective gives rise to a form of dynamic partitioning, where we track the transfer of ...
Peter W. O’Hearn   +2 more
openalex   +6 more sources

Information Hiding as a Challenge for Malware Detection [PDF]

open access: yesIEEE Security & Privacy magazine, March/April, 2015, Volume:13, Issue: 2, pp. 89-93, 2015
Information hiding techniques are increasingly utilized by the current malware to hide its existence and communication attempts. In this paper we highlight this new trend by reviewing the most notable examples of malicious software that shows this capability.
Mazurczyk Wojciech, Caviglione Luca
arxiv   +6 more sources

INFORMATION HIDING IN VIDEO [PDF]

open access: bronzeJES. Journal of Engineering Sciences, 2006
This paper proposes a video information-embedding scheme in which the embedded information is reconstructed without knowing the original host video. The proposed method presents high rate of information embedding and is robust to motion compensated coding, such as MPEG-II and MPEG-III.
Yousef B. Mahdy, Mohammed A. Atiea
openalex   +3 more sources

New Stenographic method to hiding information in digital image [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2017
Steganography is the art of hiding information in different cover media, then sending & displaying the hidden information especially in public places, Therefore, different methods have been proposed so far for hiding information. In this paper new method
Falath M.Mohammed
doaj   +3 more sources

Behavioral abstraction is hiding information

open access: bronzeTheoretical Computer Science, 2004
AbstractWe show that for any behavioral Σ-specification B there is an ordinary algebraic specification B˜ over a larger signature, such that a model behaviorally satisfies B iff it satisfies, in the ordinary sense, the Σ-theorems of B˜. The idea is to add machinery for contexts and experiments (sorts, operations and equations), use it, and then hide it.
Grigore Roşu
openalex   +3 more sources

Protecting the Color Information by Hiding it [PDF]

open access: hybrid, 2009
Few work have been proposed for image color protection. A color protection algorithm should give some comprehensive information about the image (such as its grey-level version) but should hide securely the color information. The proposed algorithms are thus specific but take into account recent signal processing concepts such as quantization ...
Marc Chaumont, William Puech
openalex   +6 more sources

Hiding Information in Retransmissions

open access: green, 2009
12 pages, 12 figures, 6 ...
Wojciech Mazurczyk   +2 more
openalex   +4 more sources

Home - About - Disclaimer - Privacy