Results 51 to 60 of about 9,838,902 (340)

Hiding Text Data in Karhunen Loeve Space by Using a Random Formula in Digital Images [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
The increasing growth of the multimedia on the network led to increasing the need to offer efficient methods to protect data and the individual property.
doaj   +1 more source

Steganography: a Class of Algorithms having Secure Properties [PDF]

open access: yes, 2011
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M.   +2 more
core   +1 more source

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2018
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib, Ahmed Talib
doaj   +1 more source

On reversible information hiding system

open access: yes2008 IEEE International Symposium on Information Theory, 2008
In this paper we consider the problem of reversible information hiding in the case when the attacker uses only discrete memoryless channels (DMC), the decoder knows only the class of channels, but not the DMC chosen by the attacker, the attacker knows the information-hiding strategy, probability distributions of all random variables, but not the side ...
Haroutunian, Mariam   +3 more
openaire   +4 more sources

Information Hiding Techniques Using Network Protocols [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj   +1 more source

Information Hiding using Steganography

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire   +1 more source

The influence of leader–signaled knowledge hiding on tourism employees’ work withdrawal behavior: A moderated mediating model

open access: yesFrontiers in Psychology, 2022
Even though organizations encourage the dissemination of knowledge and information among organizational members, the phenomenon of knowledge hiding still exists widely in organizations.
Anxin Xu   +3 more
doaj   +1 more source

Hiding bits in Bell states [PDF]

open access: yes, 2000
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication.
A. Peres   +17 more
core   +3 more sources

Automated Certification of Authorisation Policy Resistance [PDF]

open access: yes, 2013
Attribute-based Access Control (ABAC) extends traditional Access Control by considering an access request as a set of pairs attribute name-value, making it particularly useful in the context of open and distributed systems, where security relevant ...
A. Armando   +18 more
core   +1 more source

Information Hiding in Probabilistic Concurrent Systems [PDF]

open access: yes2010 Seventh International Conference on the Quantitative Evaluation of Systems, 2010
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary from inferring secret information from the observables. Anonymity and Information Flow are examples of this notion. We study the problem of information hiding in systems characterized by the coexistence of randomization and concurrency.
Andrés, Miguel   +3 more
openaire   +7 more sources

Home - About - Disclaimer - Privacy