language:
Find link is a tool written by Edward Betts.searching for Information hiding 57 found (113 total)
alternate case: information hiding
Steganography
(6,107 words)
[view diff]
exact match in snippet
view article
find links to article
2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganographyNetBarrier X4 (99 words) [view diff] exact match in snippet view article find links to article
traffic statistic, an Internet bandwidth meter, cookie filters and information hiding. The firewall is customizable, with already configured options: "NoEmerald (programming language) (187 words) [view diff] exact match in snippet view article
performance of objects, to simplify distributed programming, to exploit information hiding, and to be a small language. Black, Andrew P.; Hutchinson, NormanLinda Rising (1,212 words) [view diff] exact match in snippet view article find links to article
science from the Arizona State University, with her thesis entitled Information hiding metrics for modular programming languages relating to object-basedHigh-level assembler (420 words) [view diff] no match in snippet view article find links to article
using assembly language. High-level assemblers generally provide information-hiding facilities and the ability to call functions and procedures usingWai-Chi Fang (1,101 words) [view diff] case mismatch in snippet view article find links to article
chairman of the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. He served on Organization CommitteeMalware (7,587 words) [view diff] exact match in snippet view article find links to article
internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runsSecrecy (2,090 words) [view diff] exact match in snippet view article find links to article
technology can be more effective if it itself is not kept secret. Information hiding is a design principle in much software engineering. It is consideredShadow stack (590 words) [view diff] exact match in snippet view article find links to article
Shadow stacks themselves can be protected with guard pages or with information hiding, such that an attacker would also need to locate the shadow stackFree Haven Project (928 words) [view diff] case mismatch in snippet view article find links to article
; Wang, C. (June 2005). "Censorship Resistance Revisited" (PDF). Information Hiding. 7th International Workshop, IH 2005. Barcelona, Spain: Springer BerlinBrute-force attack (2,246 words) [view diff] case mismatch in snippet view article find links to article
"Code Obfuscation against Static and Dynamic Reverse Engineering", Information Hiding, Lecture Notes in Computer Science, vol. 6958, Berlin, Heidelberg:Subliminal channel (1,515 words) [view diff] case mismatch in snippet view article find links to article
Newton Channel. In Proceedings of the First International Workshop on Information Hiding, pages 151–156, London, UK, 1996. Springer-Verlag. Yvo Desmedt. AbusesPseudonym (6,134 words) [view diff] case mismatch in snippet view article find links to article
M. (2001). "Real World Patterns of Failure in Anonymity Systems". Information Hiding (PDF). Lecture Notes in Computer Science. Vol. 2137. pp. 230–244.Peter Wayner (538 words) [view diff] exact match in snippet view article find links to article
Peter (2008). Disappearing Cryptography -- A book on steganography, information hiding, watermarking and other techniques for disguising information. Morgan4over6 (321 words) [view diff] case mismatch in snippet view article find links to article
Tsai, Pei-Wei; Huang, Hsiang-Cheh (eds.). Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and TechnologiesPolybius square (1,131 words) [view diff] exact match in snippet view article find links to article
(David), 1938- (2011). Data privacy and security : encryption and information hiding. Springer. ISBN 978-1-4419-1816-1. OCLC 752480143.{{cite book}}: CS1Stegomalware (509 words) [view diff] case mismatch in snippet view article find links to article
Lecture Notes in Computer Science. 13th International Conference Information Hiding. Vol. 6958. Springer Berlin Heidelberg. pp. 299–313. doi:10Abstraction (computer science) (3,944 words) [view diff] exact match in snippet view article
2002). "The Law of Leaky Abstractions". Joel on Software. Abstraction/information hiding – CS211 course, Cornell University. Roberts, Eric S. (1997). ProgrammingSoftware construction (2,936 words) [view diff] exact match in snippet view article find links to article
the design characteristics found to be beneficial by researchers. Information hiding proved to be a useful design technique in large programs that madeAbstraction (computer science) (3,944 words) [view diff] exact match in snippet view article
2002). "The Law of Leaky Abstractions". Joel on Software. Abstraction/information hiding – CS211 course, Cornell University. Roberts, Eric S. (1997). ProgrammingTraffic analysis (2,397 words) [view diff] case mismatch in snippet view article find links to article
systems" (PDF). Springer Proceedings - 4th International Workshop Information Hiding. Archived (PDF) from the original on 2013-06-23. Retrieved 2013-10-05Lah number (1,812 words) [view diff] case mismatch in snippet view article find links to article
"Application of Lah Transform for Security and Privacy of Data through Information Hiding in Telecommunication". Transactions on Emerging TelecommunicationsFravia (2,260 words) [view diff] case mismatch in snippet view article find links to article
31. ISBN 978-0-596-55239-8. Andreas Pfitzmann (23 February 2000). Information Hiding: Third International Workshop, IH'99, Dresden, Germany, SeptemberIDEF4 (1,923 words) [view diff] exact match in snippet view article find links to article
object-oriented technology is inheritance. Encapsulation and Information Hiding: Encapsulation and information hiding are two object-oriented concepts that are mostRoger Dingledine (1,306 words) [view diff] case mismatch in snippet view article find links to article
a trickle to a flood: Active attacks on several mix types" (PDF). Information Hiding. Lecture Notes in Computer Science. Vol. 2578. Springer Berlin/HeidelbergAir gap (networking) (2,270 words) [view diff] case mismatch in snippet view article
Measurement of Covert Channels". Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16. pp. 115–126. doi:10.1145/2909827Electromagnetic attack (3,404 words) [view diff] case mismatch in snippet view article find links to article
Tempest: Hidden Data Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10Markus Kuhn (computer scientist) (653 words) [view diff] exact match in snippet view article
S2CID 435025. Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. CiteSeerX 10.1.1Vector quantization (1,649 words) [view diff] case mismatch in snippet view article find links to article
Compression, and Coding Library (open source) VQ Indexes Compression and Information Hiding Using Hybrid Lossless Index Coding, Wen-Jan Chen and Wen-Tsung HuangSimpleScreenRecorder (332 words) [view diff] exact match in snippet view article find links to article
Szczypiorski, Krzysztof; Janicki, Artur (8 July 2015). "YouSkyde: information hiding for Skype video traffic". Multimedia Tools and Applications. 75 (21):System appreciation (175 words) [view diff] case mismatch in snippet view article find links to article
361623. S2CID 53856438. Parnas D.L. (2002). "The Secret History of Information Hiding" in Software Pioneers: Contributions to Software Engineering. SpringerPrinter tracking dots (1,627 words) [view diff] case mismatch in snippet view article find links to article
Anonymisation of Printed Documents". Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. ACM. pp. 127–138. doi:10.1145/3206004.3206019Air-gap malware (747 words) [view diff] case mismatch in snippet view article find links to article
Measurement of Covert Channels". Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. IH&MMSec '16. New York, NY, USA: ACM. ppDymola (1,126 words) [view diff] exact match in snippet view article find links to article
air conditioning, etc. For commercial libraries Dymola supports information hiding and encryption. Typical application areas which are facilitated byList of steganography techniques (3,454 words) [view diff] exact match in snippet view article find links to article
2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganographyCovert channel (2,015 words) [view diff] exact match in snippet view article find links to article
1109/comst.2007.4317620. hdl:1959.3/40808. ISSN 1553-877X. S2CID 15247126. Information hiding in communication networks : fundamentals, mechanisms, applicationsKilling of Jamar Clark (3,684 words) [view diff] exact match in snippet view article find links to article
protested for days outside the police precinct, protesting against information hiding, demanding for release of police dashcam and bodycam videos containingSteven Murdoch (566 words) [view diff] case mismatch in snippet view article find links to article
S. J.; Lewis, S. (2005). "Embedding Covert Channels into TCP/IP". Information Hiding. Lecture Notes in Computer Science. Vol. 3727. p. 247. CiteSeerX 10Copy detection pattern (1,729 words) [view diff] case mismatch in snippet view article find links to article
Using a Neural Approach" (PDF). Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York, New York, USA: ACM Press. pp. 77–82Computer security compromised by hardware failure (5,114 words) [view diff] case mismatch in snippet view article find links to article
Tempest: Hidden Data Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10List of programming languages by type (6,703 words) [view diff] exact match in snippet view article find links to article
Groovy Join Java Tea X10 LabVIEW Lua Modula-2 (data abstraction, information hiding, strong typing, full modularity) Modula-3 (added more object-orientedShlaer–Mellor method (1,664 words) [view diff] exact match in snippet view article find links to article
The emphasis in these methods was on modeling the problem domain, information hiding, and inheritance... Martin Reddy (2011) API Design for C++. p.126Cardan grille (784 words) [view diff] case mismatch in snippet view article find links to article
(cryptography) Fabien A. P. Petitcolas and Stefan Katzenbeisser. Information Hiding Techniques for Steganography and Digital Watermarking. 2000. NatureHany Farid (2,245 words) [view diff] case mismatch in snippet view article find links to article
Through Specular Highlights on the Eye, 9th International Workshop on Information Hiding, Saint Malo, France (2007). Lyu, S, D Rockmore, and H Farid, A DigitalVienna Development Method (5,128 words) [view diff] exact match in snippet view article find links to article
contains different structuring principles. These all follow traditional information hiding principles with modules and they can be explained as: Module naming:Serial Copy Management System (1,043 words) [view diff] case mismatch in snippet view article find links to article
"Attacks on Copyright Marking Systems". In David Aucsmith (ed.). Information Hiding. Lecture Notes in Computer Science. Vol. 1525. Portland, Oregon, USAKeith Winstein (806 words) [view diff] case mismatch in snippet view article find links to article
Stephen and Ching-Yun (Frannie) Chang. "Linguistic Steganography: Information Hiding in Text", University of Cambridge Computer Laboratory, May 2012. RetrievedExtension neural network (1,589 words) [view diff] case mismatch in snippet view article find links to article
of Brain MRI". 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. p. 515. doi:10.1109/IIH-MSP.2009Jart Armin (1,018 words) [view diff] case mismatch in snippet view article find links to article
at Hamburg, Germany, where Armin represented the Criminal Use of Information Hiding Initiative (CUING). In October 2018, Armin presented at the GlobalPolyhedra (software) (1,447 words) [view diff] exact match in snippet view article
fully object-oriented script language that supports encapsulation, information hiding and inheritance, can determine the behaviour of data in the databaseDual EC DRBG (6,730 words) [view diff] case mismatch in snippet view article find links to article
Yung (2007). Space-Efficient Kleptography Without Random Oracles. Information Hiding. Shumow, Dan; Ferguson, Niels. "On the Possibility of a Back DoorPrivacy settings (4,487 words) [view diff] case mismatch in snippet view article find links to article
Privacy Protection Scheme for Smart Home Network System Based on Information Hiding". IEEE Access. 8: 40767–40776. doi:10.1109/access.2020.2976782. ISSN 2169-3536OutGuess (689 words) [view diff] case mismatch in snippet view article find links to article
Andreas; Pfitzmann, Andreas (2000). "Attacks on Steganographic Systems". Information Hiding (PDF). Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 61–76.Ariadna Scriabina (3,927 words) [view diff] no match in snippet view article find links to article
near Toulouse. Later they started collecting weapons and sensitive information, hiding high-risk Jews at remote farms and monasteries and ferrying themJoos Ulrich Heintz (1,048 words) [view diff] exact match in snippet view article find links to article
Pardo, L.M.; Rojas Paredes, A. (2016). "Quiz games as a model for information hiding". Journal of Complexity. 34: 1–29. arXiv:1508.07842. doi:10.1016/jMojette transform (3,873 words) [view diff] case mismatch in snippet view article find links to article
7623, p. 762317. C. Zhang, J. Dong, J. Li, and F. Autrusseau, “A New Information Hiding Method for Image Watermarking Based on Mojette Transform,” in SecondOne-letter word (7,749 words) [view diff] case mismatch in snippet view article find links to article
David Salomon (2003). Data Privacy and Security: Encryption and Information Hiding. Springer Science & Business Media. p. 22.. Edgar Allan Poe (1869)