Results 21 to 30 of about 390,993 (284)

Hiding information in electoral competition [PDF]

open access: yesGames and Economic Behavior, 2003
The authors consider the model of an election with two candidates and one representative voter. A candidate can choose one of two policy alternatives: \(B\) (building a bridge) and \(N\) (not building a bridge). There are two states of the world \(\omega_B\) (the costs of the building will be modest) and \(\omega_N\) (building will be very costly). The
Lagerlöf, J, Heidhues, P
openaire   +6 more sources

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2017
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj   +1 more source

Automated Certification of Authorisation Policy Resistance [PDF]

open access: yes, 2013
Attribute-based Access Control (ABAC) extends traditional Access Control by considering an access request as a set of pairs attribute name-value, making it particularly useful in the context of open and distributed systems, where security relevant ...
A. Armando   +18 more
core   +1 more source

Hiding Text Data in Karhunen Loeve Space by Using a Random Formula in Digital Images [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
The increasing growth of the multimedia on the network led to increasing the need to offer efficient methods to protect data and the individual property.
doaj   +1 more source

Hiding bits in Bell states [PDF]

open access: yes, 2000
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication.
A. Peres   +17 more
core   +3 more sources

Information hiding using matroid theory

open access: yesAdvances in Applied Mathematics, 2021
Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol to transmit a secret without revealing it to external observers. This is a question of how large a linear code can be, when it is required to agree with a prescribed code on a collection of coordinate sets.
Kuznetsova, Olga, Freij-Hollanti, Ragnar
openaire   +5 more sources

Stone Painting Generative Information Hiding Method Through Triangulation and Bezier Curves [PDF]

open access: yesJisuanji gongcheng
Unlike natural carrier-based coverless information hiding, non-natural carrier-based coverless information hiding does not attempt to generate or utilize natural carriers to hide secret information, which can fundamentally avoid the discrimination ...
REN Zhiyi, SHAO Liping
doaj   +1 more source

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2018
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib, Ahmed Talib
doaj   +1 more source

Information Hiding Techniques Using Network Protocols [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj   +1 more source

A scheme of hiding large-size image into small-size image based on FCdDNet [PDF]

open access: yesPeerJ Computer Science
The hiding capacity of the current information hiding field has reached a relatively high level, which can hide two color images into one color image. In order to explore a larger hidden capacity, an information hiding scheme based on an improved FCdDNet
Lianshan Liu   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy