Results 51 to 60 of about 9,838,902 (340)
Hiding Text Data in Karhunen Loeve Space by Using a Random Formula in Digital Images [PDF]
The increasing growth of the multimedia on the network led to increasing the need to offer efficient methods to protect data and the individual property.
doaj +1 more source
Steganography: a Class of Algorithms having Secure Properties [PDF]
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M.+2 more
core +1 more source
Corners-based Image Information Hiding Method
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method.
Ahmed Talib, Ahmed Talib
doaj +1 more source
On reversible information hiding system
In this paper we consider the problem of reversible information hiding in the case when the attacker uses only discrete memoryless channels (DMC), the decoder knows only the class of channels, but not the DMC chosen by the attacker, the attacker knows the information-hiding strategy, probability distributions of all random variables, but not the side ...
Haroutunian, Mariam+3 more
openaire +4 more sources
Information Hiding Techniques Using Network Protocols [PDF]
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj +1 more source
Information Hiding using Steganography
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire +1 more source
Even though organizations encourage the dissemination of knowledge and information among organizational members, the phenomenon of knowledge hiding still exists widely in organizations.
Anxin Xu+3 more
doaj +1 more source
Hiding bits in Bell states [PDF]
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication.
A. Peres+17 more
core +3 more sources
Automated Certification of Authorisation Policy Resistance [PDF]
Attribute-based Access Control (ABAC) extends traditional Access Control by considering an access request as a set of pairs attribute name-value, making it particularly useful in the context of open and distributed systems, where security relevant ...
A. Armando+18 more
core +1 more source
Information Hiding in Probabilistic Concurrent Systems [PDF]
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary from inferring secret information from the observables. Anonymity and Information Flow are examples of this notion. We study the problem of information hiding in systems characterized by the coexistence of randomization and concurrency.
Andrés, Miguel+3 more
openaire +7 more sources