Results 51 to 60 of about 9,721,388 (323)
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib
doaj +1 more source
Information Hiding Techniques Using Network Protocols [PDF]
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj +1 more source
We expand on our work on Quantum Data Hiding -- hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme.
arxiv +1 more source
On reversible information hiding system
In this paper we consider the problem of reversible information hiding in the case when the attacker uses only discrete memoryless channels (DMC), the decoder knows only the class of channels, but not the DMC chosen by the attacker, the attacker knows the information-hiding strategy, probability distributions of all random variables, but not the side ...
Haroutunian, Mariam+3 more
openaire +4 more sources
Information Hiding using Steganography
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire +1 more source
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib, Ahmed Talib
doaj +1 more source
Even though organizations encourage the dissemination of knowledge and information among organizational members, the phenomenon of knowledge hiding still exists widely in organizations.
Anxin Xu+3 more
doaj +1 more source
Quiz games as a model for information hiding
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems of elimination theory.
Bernd Bank+5 more
openalex +5 more sources
Information Bleaching, No-Hiding Theorem and Indefinite Causal Order [PDF]
The information bleaching refers to any physical process that removes quantum information from the initial state of the physical system. The no-hiding theorem proves that if information is lost from the initial system, then it cannot remain in the bipartite quantum correlation and must be found in the remainder of the Hilbert space.
arxiv
Information Hiding in Probabilistic Concurrent Systems [PDF]
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary from inferring secret information from the observables. Anonymity and Information Flow are examples of this notion. We study the problem of information hiding in systems characterized by the coexistence of randomization and concurrency.
Andrés, Miguel+3 more
openaire +8 more sources