Results 31 to 40 of about 9,838,902 (340)

Hiding Information in Open Auctions [PDF]

open access: yesSSRN Electronic Journal, 2012
The defining characteristic of an open format is that it allows to aggregate extra information on top of the one that is available ex-ante. This paper shows that bidders may have an incentive to strategically manipulate this extra flow of information by employing jump bids.We show that jump bidding can have a dramatic impact on equilibrium behavior and
David Ettinger, Fabio Michelucci
openaire   +3 more sources

Quantum data hiding in the presence of noise [PDF]

open access: yes, 2016
When classical or quantum information is broadcast to separate receivers, there exist codes that encrypt the encoded data such that the receivers cannot recover it when performing local operations and classical communication, but they can decode reliably
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core   +3 more sources

Information-hiding cameras: Optical concealment of object information into ordinary images [PDF]

open access: yesScience Advances
We introduce an information-hiding camera integrated with an electronic decoder that is jointly optimized through deep learning. This system uses a diffractive optical processor, which transforms and hides input images into ordinary-looking patterns that
Bijie Bai   +6 more
semanticscholar   +1 more source

Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing

open access: yesIEEE Access, 2020
Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding ...
Shuai Ren   +3 more
doaj   +1 more source

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

Hybrid Information Hiding Technique Using Parametric Spline and DFT [PDF]

open access: yesEngineering and Technology Journal, 2010
Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set
Hanaa M   +2 more
doaj   +1 more source

LSB Data Hiding in Digital Media: A Survey

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2022
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.
Dang Ninh Tran   +2 more
doaj   +1 more source

A video coverless information hiding algorithm based on semantic segmentation

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
semanticscholar   +1 more source

On Hiding Information from an Oracle

open access: yesProceeding Structure in Complexity Theory, 1987
AbstractWe consider the problem of computing with encrypted data. Player A wishes to know the value f(x) for some x but lacks the power to compute it. Player B has the power to compute f an is willing to send f(y) to A if she sends him y, for any y. Informally, an encryption scheme for the problem f is a method by which A, using her inferior resources,
Martín Abadi   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy