Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Information hiding 57 found (113 total)

alternate case: information hiding

Steganography (6,107 words) [view diff] exact match in snippet view article find links to article

2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganography
NetBarrier X4 (99 words) [view diff] exact match in snippet view article find links to article
traffic statistic, an Internet bandwidth meter, cookie filters and information hiding. The firewall is customizable, with already configured options: "No
Emerald (programming language) (187 words) [view diff] exact match in snippet view article
performance of objects, to simplify distributed programming, to exploit information hiding, and to be a small language. Black, Andrew P.; Hutchinson, Norman
Linda Rising (1,212 words) [view diff] exact match in snippet view article find links to article
science from the Arizona State University, with her thesis entitled Information hiding metrics for modular programming languages relating to object-based
High-level assembler (420 words) [view diff] no match in snippet view article find links to article
using assembly language. High-level assemblers generally provide information-hiding facilities and the ability to call functions and procedures using
Wai-Chi Fang (1,101 words) [view diff] case mismatch in snippet view article find links to article
chairman of the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. He served on Organization Committee
Malware (7,587 words) [view diff] exact match in snippet view article find links to article
internal data so that automated tools do not detect the malware; (v) information hiding techniques, namely stegomalware; and (5) fileless malware which runs
Secrecy (2,090 words) [view diff] exact match in snippet view article find links to article
technology can be more effective if it itself is not kept secret. Information hiding is a design principle in much software engineering. It is considered
Shadow stack (590 words) [view diff] exact match in snippet view article find links to article
Shadow stacks themselves can be protected with guard pages or with information hiding, such that an attacker would also need to locate the shadow stack
Free Haven Project (928 words) [view diff] case mismatch in snippet view article find links to article
; Wang, C. (June 2005). "Censorship Resistance Revisited" (PDF). Information Hiding. 7th International Workshop, IH 2005. Barcelona, Spain: Springer Berlin
Brute-force attack (2,246 words) [view diff] case mismatch in snippet view article find links to article
"Code Obfuscation against Static and Dynamic Reverse Engineering", Information Hiding, Lecture Notes in Computer Science, vol. 6958, Berlin, Heidelberg:
Subliminal channel (1,515 words) [view diff] case mismatch in snippet view article find links to article
Newton Channel. In Proceedings of the First International Workshop on Information Hiding, pages 151–156, London, UK, 1996. Springer-Verlag. Yvo Desmedt. Abuses
Pseudonym (6,134 words) [view diff] case mismatch in snippet view article find links to article
M. (2001). "Real World Patterns of Failure in Anonymity Systems". Information Hiding (PDF). Lecture Notes in Computer Science. Vol. 2137. pp. 230–244.
Peter Wayner (538 words) [view diff] exact match in snippet view article find links to article
Peter (2008). Disappearing Cryptography -- A book on steganography, information hiding, watermarking and other techniques for disguising information. Morgan
4over6 (321 words) [view diff] case mismatch in snippet view article find links to article
Tsai, Pei-Wei; Huang, Hsiang-Cheh (eds.). Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies
Polybius square (1,131 words) [view diff] exact match in snippet view article find links to article
(David), 1938- (2011). Data privacy and security : encryption and information hiding. Springer. ISBN 978-1-4419-1816-1. OCLC 752480143.{{cite book}}: CS1
Stegomalware (509 words) [view diff] case mismatch in snippet view article find links to article
Lecture Notes in Computer Science. 13th International Conference Information Hiding. Vol. 6958. Springer Berlin Heidelberg. pp. 299–313. doi:10
Abstraction (computer science) (3,944 words) [view diff] exact match in snippet view article
2002). "The Law of Leaky Abstractions". Joel on Software. Abstraction/information hiding – CS211 course, Cornell University. Roberts, Eric S. (1997). Programming
Software construction (2,936 words) [view diff] exact match in snippet view article find links to article
the design characteristics found to be beneficial by researchers. Information hiding proved to be a useful design technique in large programs that made
Abstraction (computer science) (3,944 words) [view diff] exact match in snippet view article
2002). "The Law of Leaky Abstractions". Joel on Software. Abstraction/information hiding – CS211 course, Cornell University. Roberts, Eric S. (1997). Programming
Traffic analysis (2,397 words) [view diff] case mismatch in snippet view article find links to article
systems" (PDF). Springer Proceedings - 4th International Workshop Information Hiding. Archived (PDF) from the original on 2013-06-23. Retrieved 2013-10-05
Lah number (1,812 words) [view diff] case mismatch in snippet view article find links to article
"Application of Lah Transform for Security and Privacy of Data through Information Hiding in Telecommunication". Transactions on Emerging Telecommunications
Fravia (2,260 words) [view diff] case mismatch in snippet view article find links to article
 31. ISBN 978-0-596-55239-8. Andreas Pfitzmann (23 February 2000). Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September
IDEF4 (1,923 words) [view diff] exact match in snippet view article find links to article
object-oriented technology is inheritance. Encapsulation and Information Hiding: Encapsulation and information hiding are two object-oriented concepts that are most
Roger Dingledine (1,306 words) [view diff] case mismatch in snippet view article find links to article
a trickle to a flood: Active attacks on several mix types" (PDF). Information Hiding. Lecture Notes in Computer Science. Vol. 2578. Springer Berlin/Heidelberg
Air gap (networking) (2,270 words) [view diff] case mismatch in snippet view article
Measurement of Covert Channels". Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16. pp. 115–126. doi:10.1145/2909827
Electromagnetic attack (3,404 words) [view diff] case mismatch in snippet view article find links to article
Tempest: Hidden Data Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10
Markus Kuhn (computer scientist) (653 words) [view diff] exact match in snippet view article
S2CID 435025. Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. CiteSeerX 10.1.1
Vector quantization (1,649 words) [view diff] case mismatch in snippet view article find links to article
Compression, and Coding Library (open source) VQ Indexes Compression and Information Hiding Using Hybrid Lossless Index Coding, Wen-Jan Chen and Wen-Tsung Huang
SimpleScreenRecorder (332 words) [view diff] exact match in snippet view article find links to article
Szczypiorski, Krzysztof; Janicki, Artur (8 July 2015). "YouSkyde: information hiding for Skype video traffic". Multimedia Tools and Applications. 75 (21):
System appreciation (175 words) [view diff] case mismatch in snippet view article find links to article
361623. S2CID 53856438. Parnas D.L. (2002). "The Secret History of Information Hiding" in Software Pioneers: Contributions to Software Engineering. Springer
Printer tracking dots (1,627 words) [view diff] case mismatch in snippet view article find links to article
Anonymisation of Printed Documents". Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. ACM. pp. 127–138. doi:10.1145/3206004.3206019
Air-gap malware (747 words) [view diff] case mismatch in snippet view article find links to article
Measurement of Covert Channels". Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. IH&MMSec '16. New York, NY, USA: ACM. pp
Dymola (1,126 words) [view diff] exact match in snippet view article find links to article
air conditioning, etc. For commercial libraries Dymola supports information hiding and encryption. Typical application areas which are facilitated by
List of steganography techniques (3,454 words) [view diff] exact match in snippet view article find links to article
2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganography
Covert channel (2,015 words) [view diff] exact match in snippet view article find links to article
1109/comst.2007.4317620. hdl:1959.3/40808. ISSN 1553-877X. S2CID 15247126. Information hiding in communication networks : fundamentals, mechanisms, applications
Killing of Jamar Clark (3,684 words) [view diff] exact match in snippet view article find links to article
protested for days outside the police precinct, protesting against information hiding, demanding for release of police dashcam and bodycam videos containing
Steven Murdoch (566 words) [view diff] case mismatch in snippet view article find links to article
S. J.; Lewis, S. (2005). "Embedding Covert Channels into TCP/IP". Information Hiding. Lecture Notes in Computer Science. Vol. 3727. p. 247. CiteSeerX 10
Copy detection pattern (1,729 words) [view diff] case mismatch in snippet view article find links to article
Using a Neural Approach" (PDF). Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York, New York, USA: ACM Press. pp. 77–82
Computer security compromised by hardware failure (5,114 words) [view diff] case mismatch in snippet view article find links to article
Tempest: Hidden Data Transmission Using Electromagnetic Emanations". Information Hiding. Lecture Notes in Computer Science. Vol. 1525. pp. 124–142. CiteSeerX 10
List of programming languages by type (6,703 words) [view diff] exact match in snippet view article find links to article
Groovy Join Java Tea X10 LabVIEW Lua Modula-2 (data abstraction, information hiding, strong typing, full modularity) Modula-3 (added more object-oriented
Shlaer–Mellor method (1,664 words) [view diff] exact match in snippet view article find links to article
The emphasis in these methods was on modeling the problem domain, information hiding, and inheritance... Martin Reddy (2011) API Design for C++. p.126
Cardan grille (784 words) [view diff] case mismatch in snippet view article find links to article
(cryptography) Fabien A. P. Petitcolas and Stefan Katzenbeisser. Information Hiding Techniques for Steganography and Digital Watermarking. 2000. Nature
Hany Farid (2,245 words) [view diff] case mismatch in snippet view article find links to article
Through Specular Highlights on the Eye, 9th International Workshop on Information Hiding, Saint Malo, France (2007). Lyu, S, D Rockmore, and H Farid, A Digital
Vienna Development Method (5,128 words) [view diff] exact match in snippet view article find links to article
contains different structuring principles. These all follow traditional information hiding principles with modules and they can be explained as: Module naming:
Serial Copy Management System (1,043 words) [view diff] case mismatch in snippet view article find links to article
"Attacks on Copyright Marking Systems". In David Aucsmith (ed.). Information Hiding. Lecture Notes in Computer Science. Vol. 1525. Portland, Oregon, USA
Keith Winstein (806 words) [view diff] case mismatch in snippet view article find links to article
Stephen and Ching-Yun (Frannie) Chang. "Linguistic Steganography: Information Hiding in Text", University of Cambridge Computer Laboratory, May 2012. Retrieved
Extension neural network (1,589 words) [view diff] case mismatch in snippet view article find links to article
of Brain MRI". 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. p. 515. doi:10.1109/IIH-MSP.2009
Jart Armin (1,018 words) [view diff] case mismatch in snippet view article find links to article
at Hamburg, Germany, where Armin represented the Criminal Use of Information Hiding Initiative (CUING). In October 2018, Armin presented at the Global
Polyhedra (software) (1,447 words) [view diff] exact match in snippet view article
fully object-oriented script language that supports encapsulation, information hiding and inheritance, can determine the behaviour of data in the database
Dual EC DRBG (6,730 words) [view diff] case mismatch in snippet view article find links to article
Yung (2007). Space-Efficient Kleptography Without Random Oracles. Information Hiding. Shumow, Dan; Ferguson, Niels. "On the Possibility of a Back Door
Privacy settings (4,487 words) [view diff] case mismatch in snippet view article find links to article
Privacy Protection Scheme for Smart Home Network System Based on Information Hiding". IEEE Access. 8: 40767–40776. doi:10.1109/access.2020.2976782. ISSN 2169-3536
OutGuess (689 words) [view diff] case mismatch in snippet view article find links to article
Andreas; Pfitzmann, Andreas (2000). "Attacks on Steganographic Systems". Information Hiding (PDF). Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 61–76.
Ariadna Scriabina (3,927 words) [view diff] no match in snippet view article find links to article
near Toulouse. Later they started collecting weapons and sensitive information, hiding high-risk Jews at remote farms and monasteries and ferrying them
Joos Ulrich Heintz (1,048 words) [view diff] exact match in snippet view article find links to article
Pardo, L.M.; Rojas Paredes, A. (2016). "Quiz games as a model for information hiding". Journal of Complexity. 34: 1–29. arXiv:1508.07842. doi:10.1016/j
Mojette transform (3,873 words) [view diff] case mismatch in snippet view article find links to article
7623, p. 762317. C. Zhang, J. Dong, J. Li, and F. Autrusseau, “A New Information Hiding Method for Image Watermarking Based on Mojette Transform,” in Second
One-letter word (7,749 words) [view diff] case mismatch in snippet view article find links to article
David Salomon (2003). Data Privacy and Security: Encryption and Information Hiding. Springer Science & Business Media. p. 22.. Edgar Allan Poe (1869)