Results 31 to 40 of about 391,871 (286)

Information Hiding Techniques Using Network Protocols [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj   +1 more source

An area law for entanglement from exponential decay of correlations [PDF]

open access: yes, 2013
Area laws for entanglement in quantum many-body systems give useful information about their low-temperature behaviour and are tightly connected to the possibility of good numerical simulations. An intuition from quantum many-body physics suggests that an
A Uhlmann   +39 more
core   +2 more sources

Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images

open access: yesمجلة بغداد للعلوم, 2019
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features.
Raheem Abdul Sahib Ogla
doaj   +1 more source

Large-capacity information hiding scheme based on minimum pixel modification

open access: yesEgyptian Informatics Journal, 2022
Information hiding is an important technique for security-related applications, and it can be used wildly in many scenarios. Secret data embedding methods are proposed in spatial, frequency, and other domains by researchers in recent years.
Zhang Yu   +4 more
doaj   +1 more source

Genre-Based Information Hiding [PDF]

open access: yes, 2012
While data encryption is an effective means of keeping data private it does not conceal the presence of 'hidden' information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place
Ogilvie, Russell, Weir, George R.S.
openaire   +2 more sources

Improved information hiding algorithm based on twice positioning in coding channel

open access: yesTongxin xuebao, 2013
Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice ...
Li-quan CHEN   +3 more
doaj   +2 more sources

Information Hiding Using Geographic Information System (GIS) Vector File [PDF]

open access: yesEngineering and Technology Journal, 2017
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges.
R.F. Hassan, M.S. Mohammed
doaj   +1 more source

Quantum Data Hiding

open access: yes, 2001
We expand on our work on Quantum Data Hiding -- hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC).
DiVincenzo, David P.   +2 more
core   +1 more source

Transcriptional profiling of circulating extracellular vesicles from prebiopsy prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner   +14 more
wiley   +1 more source

Information-theoretic analysis of information hiding [PDF]

open access: yesIEEE Transactions on Information Theory, 2002
Summary: An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding.
Moulin, Pierre, O'Sullivan, Joseph A.
openaire   +2 more sources

Home - About - Disclaimer - Privacy