Results 31 to 40 of about 392,009 (311)
Automated Certification of Authorisation Policy Resistance [PDF]
Attribute-based Access Control (ABAC) extends traditional Access Control by considering an access request as a set of pairs attribute name-value, making it particularly useful in the context of open and distributed systems, where security relevant ...
A. Armando +18 more
core +1 more source
Information Hiding Techniques Using Network Protocols [PDF]
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj +1 more source
A scheme of hiding large-size image into small-size image based on FCdDNet [PDF]
The hiding capacity of the current information hiding field has reached a relatively high level, which can hide two color images into one color image. In order to explore a larger hidden capacity, an information hiding scheme based on an improved FCdDNet
Lianshan Liu +3 more
doaj +2 more sources
Quiz Games as a model for Information Hiding [PDF]
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.
Bank, Bernd +5 more
core +2 more sources
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features.
Raheem Abdul Sahib Ogla
doaj +1 more source
Large-capacity information hiding scheme based on minimum pixel modification
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu +4 more
doaj +1 more source
Genre-Based Information Hiding [PDF]
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire +2 more sources
Compositional Methods for Information-Hiding [PDF]
Systems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information.
Braun, Christelle +2 more
openaire +7 more sources
Improved information hiding algorithm based on twice positioning in coding channel
Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice ...
Li-quan CHEN +3 more
doaj +2 more sources
Information Hiding Using Geographic Information System (GIS) Vector File [PDF]
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges.
R.F. Hassan, M.S. Mohammed
doaj +1 more source

