Results 21 to 30 of about 392,009 (311)
Text File Hiding Randomly Using Secret Sharing Scheme [PDF]
Exchange of information through the channels of communication can beunsafe. Communication media are not safe to send sensitive information so it isnecessary to provide the protection of information from disclosure to unauthorizedpersons.
Yossra Ali, Hussein Mankhi
doaj +1 more source
Image encryption algorithm based on reversible information hiding and physical chaos in images
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small ...
Pengcheng Liu
doaj +1 more source
Hiding information in electoral competition [PDF]
The authors consider the model of an election with two candidates and one representative voter. A candidate can choose one of two policy alternatives: \(B\) (building a bridge) and \(N\) (not building a bridge). There are two states of the world \(\omega_B\) (the costs of the building will be modest) and \(\omega_N\) (building will be very costly). The
Lagerlöf, J, Heidhues, P
openaire +6 more sources
Hiding Text Data in Karhunen Loeve Space by Using a Random Formula in Digital Images [PDF]
The increasing growth of the multimedia on the network led to increasing the need to offer efficient methods to protect data and the individual property.
doaj +1 more source
Hiding bits in Bell states [PDF]
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication.
A. Peres +17 more
core +3 more sources
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj +1 more source
Information hiding using matroid theory
Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol to transmit a secret without revealing it to external observers. This is a question of how large a linear code can be, when it is required to agree with a prescribed code on a collection of coordinate sets.
Kuznetsova, Olga, Freij-Hollanti, Ragnar
openaire +5 more sources
Stone Painting Generative Information Hiding Method Through Triangulation and Bezier Curves [PDF]
Unlike natural carrier-based coverless information hiding, non-natural carrier-based coverless information hiding does not attempt to generate or utilize natural carriers to hide secret information, which can fundamentally avoid the discrimination ...
REN Zhiyi, SHAO Liping
doaj +1 more source
An area law for entanglement from exponential decay of correlations [PDF]
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann +39 more
core +2 more sources
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib, Ahmed Talib
doaj +1 more source

