Results 51 to 60 of about 9,721,388 (323)

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2017
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj   +1 more source

Information Hiding Techniques Using Network Protocols [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj   +1 more source

Quantum Data Hiding [PDF]

open access: yesIEEE Trans. Inf Theory Vol. 48. No. 3, 580-599 (2002), 2001
We expand on our work on Quantum Data Hiding -- hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme.
arxiv   +1 more source

On reversible information hiding system

open access: yes2008 IEEE International Symposium on Information Theory, 2008
In this paper we consider the problem of reversible information hiding in the case when the attacker uses only discrete memoryless channels (DMC), the decoder knows only the class of channels, but not the DMC chosen by the attacker, the attacker knows the information-hiding strategy, probability distributions of all random variables, but not the side ...
Haroutunian, Mariam   +3 more
openaire   +4 more sources

Information Hiding using Steganography

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire   +1 more source

Corners-based Image Information Hiding Method

open access: yesIraqi Journal for Computers and Informatics, 2018
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib, Ahmed Talib
doaj   +1 more source

The influence of leader–signaled knowledge hiding on tourism employees’ work withdrawal behavior: A moderated mediating model

open access: yesFrontiers in Psychology, 2022
Even though organizations encourage the dissemination of knowledge and information among organizational members, the phenomenon of knowledge hiding still exists widely in organizations.
Anxin Xu   +3 more
doaj   +1 more source

Quiz games as a model for information hiding

open access: bronzeJournal of Complexity, 2015
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems of elimination theory.
Bernd Bank   +5 more
openalex   +5 more sources

Information Bleaching, No-Hiding Theorem and Indefinite Causal Order [PDF]

open access: yesarXiv, 2022
The information bleaching refers to any physical process that removes quantum information from the initial state of the physical system. The no-hiding theorem proves that if information is lost from the initial system, then it cannot remain in the bipartite quantum correlation and must be found in the remainder of the Hilbert space.
arxiv  

Information Hiding in Probabilistic Concurrent Systems [PDF]

open access: yes2010 Seventh International Conference on the Quantitative Evaluation of Systems, 2010
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary from inferring secret information from the observables. Anonymity and Information Flow are examples of this notion. We study the problem of information hiding in systems characterized by the coexistence of randomization and concurrency.
Andrés, Miguel   +3 more
openaire   +8 more sources

Home - About - Disclaimer - Privacy