Results 21 to 30 of about 700,587 (318)

Anonymity and Information Hiding in Multiagent Systems [PDF]

open access: yesarXiv, 2004
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy [Halpern and O'Neill 2002].
Joseph Y. Halpern, Kevin Ross O'Neill
arxiv   +6 more sources

Active hiding of social information from information-parasites [PDF]

open access: goldBMC Evolutionary Biology, 2014
Coevolution between pairs of different kind of entities, such as providers and users of information, involves reciprocal selection pressures between them as a consequence of their ecological interaction. Pied flycatchers (Ficedula hypoleuca) have been shown to derive fitness benefits (larger clutches) when nesting in proximity to great tits (Parus ...
Olli J. Loukola   +3 more
openalex   +6 more sources

A scheme of hiding large-size image into small-size image based on FCdDNet [PDF]

open access: yesPeerJ Computer Science
The hiding capacity of the current information hiding field has reached a relatively high level, which can hide two color images into one color image. In order to explore a larger hidden capacity, an information hiding scheme based on an improved FCdDNet
Lianshan Liu   +3 more
doaj   +3 more sources

New Stenographic method to hiding information in digital image [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2017
Steganography is the art of hiding information in different cover media, then sending & displaying the hidden information especially in public places, Therefore, different methods have been proposed so far for hiding information. In this paper new method
Falath M.Mohammed
doaj   +3 more sources

Information hiding based on Augmented Reality

open access: yesMathematical Biosciences and Engineering, 2019
Information hiding aims to achieve secret communication via certain carrier. However, these carrier-based methods often have different kinds of deficiencies.
Chuanlong Li , Xingming Sun, Yuqian Li
doaj   +4 more sources

Analysis of Information Hiding Techniques in the Texts [PDF]

open access: yesEngineering and Technology Journal, 2005
Nowadays ; information hiding represents one of important sciences , which was found more importance by the researchers . The goal of steganography is to transmit messages to destination in full secrecy .
Abdul Rahma, Abdalla Al - Dhao
doaj   +1 more source

A New Proposed Coding Method for Steganography Purpose [PDF]

open access: yesEngineering and Technology Journal, 2021
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission.
Suhad Kadhem
doaj   +1 more source

Compositional Methods for Information-Hiding [PDF]

open access: yesMathematical Structures in Computer Science, 2008
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle   +2 more
openaire   +10 more sources

On information hiding in retransmissions [PDF]

open access: yesTelecommunication Systems, 2011
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of protocols that utilises retransmission mechanisms.
Krzysztof Szczypiorski   +2 more
openaire   +2 more sources

Longitudinal predictors of weapon involvement in middle adolescence: Evidence from the UK Millennium Cohort Study

open access: yesAggressive Behavior, Volume 49, Issue 1, Page 5-14, January 2023., 2023
Abstract This study uses longitudinal data from the UK Millennium Cohort Study (N = 13,277) to examine the childhood and early adolescence factors that predict weapon involvement in middle adolescence, which in this study is exemplified by having carried or used a weapon.
Aase Villadsen, Emla Fitzsimons
wiley   +1 more source

Home - About - Disclaimer - Privacy