• No results found

Knowledge Hiding

The relations of personality, conflict, and future interdependence with knowledge hiding intentions

The relations of personality, conflict, and future interdependence with knowledge hiding intentions

... and knowledge transfer are one of the most widely researched subjects of professional and academic exchange in various disciplines such as management, sociology, information sciences, educational science and ...

51

To Explore the Impact of Knowledge Hiding Towards Entrepreneurial Intentions - An Empirical Study of Software Industry

To Explore the Impact of Knowledge Hiding Towards Entrepreneurial Intentions - An Empirical Study of Software Industry

... the knowledge transfer and knowledge sharing are most commonly researched issues for professionals and academic ...improve knowledge, knowledge sharing in organizational achievement has been ...

14

Traditional knowledge hiding in plain sight – twenty-first century ethnobotany of the Chácobo in Beni, Bolivia

Traditional knowledge hiding in plain sight – twenty-first century ethnobotany of the Chácobo in Beni, Bolivia

... Methods: Based on previous reports and our preliminary studies, we hypothesized that twenty-first century Chácobo plant use centered on income generation, and that traditional plant use related to household utensils, ...

47

Download
			
			
				Download PDF

Download Download PDF

... (2017), knowledge management is comprised of “strategies and processes designed to identify, capture, structure, value, leverage, and share an organization’s intellectual assets to enhance its performance and ...

8

Ethical Leadership and Knowledge Management Behaviors: Role of Organizational Citizenship Behavior and Procedural Justice

Ethical Leadership and Knowledge Management Behaviors: Role of Organizational Citizenship Behavior and Procedural Justice

... share knowledge with each other it has some detrimental effects for organization in terms of its competitiveness and long term survival in the market, so it is deemed as defilement of ethical code of an ...role ...

14

A Survey on Novel Approach for Non-cryptographic Privacy Preservation

A Survey on Novel Approach for Non-cryptographic Privacy Preservation

... Data hiding is changes or edit of confidential information from the data before disclosing to ...others. Knowledge hiding is based on hiding the sensitive knowledge which can be ...

6

A Empirical Study on Steganography Concepts and its Applications

A Empirical Study on Steganography Concepts and its Applications

... Data hiding is one of the emerging techniques that aim to provide for security by hiding secret information into the multimedia contents by altering some nonessential components in the host or cover ...

5

Reversible Image Data Hiding with Edge Preservation in Colored Images

Reversible Image Data Hiding with Edge Preservation in Colored Images

... application, hiding of data is an important need. In many cases of hiding the data, the cover image may distort due to embedding of data and hence it cannot be exactly recovered from marked image because of ...

8

One-out-of-Many  Proofs:  Or  How  to  Leak  a  Secret   and  Spend  a  Coin

One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin

... While existing constructions are constant in the number of coins on the bulletin board, RSA accumulator based zerocoin proofs consist of ∼ 50, 000 bytes, compared with 32(7 log N + 1) bytes in our construction using ...

19

Data Hiding using JPEG Steganography

Data Hiding using JPEG Steganography

... means hiding or covering a text, image or file into another image, file or ...of hiding data where a sender and receiver knows a secret message is hidden into a file, where a third person cannot suspect ...

5

Volume 2, Issue 7, July 2013 Page 225

Volume 2, Issue 7, July 2013 Page 225

... Then we have presented the two techniques for hiding sensitive itemsets based on item-restriction that hide sensitive itemsets. We have also shown that rather simple new data structures implement these techniques ...

9

New Design for Information Hiding with in Steganography Using Distortion Techniques

New Design for Information Hiding with in Steganography Using Distortion Techniques

... new hiding methods and cover objects which hidden information is embedded ...information hiding system is ...identify hiding information, the proposed system considers overcoming this dilemma by ...

6

Quantumness of correlations, quantumness of ensembles and quantum data hiding

Quantumness of correlations, quantumness of ensembles and quantum data hiding

... data hiding does not require entanglement, in the sense that there are pairs of hiding states — states used to encode a bit, so that such a bit is recoverable by global quantum operations but not by local ...

33

Secure Reversible Data Hiding in Encrypted Images By Reserving Space In Advance

Secure Reversible Data Hiding in Encrypted Images By Reserving Space In Advance

... data hiding in encrypted images is a new topic drawing attention because of the privacy-preserving requirements from cloud data ...data hiding with image encryption involves banking, medical images, ...

8

Separable Reversible Data Hiding in Image Using
          Advanced Encryption Standard with Fake Data
          Generation

Separable Reversible Data Hiding in Image Using Advanced Encryption Standard with Fake Data Generation

... These file uploading by the sender is done when he is properly logged in to the system. The receiver on the other hand, authenticates himself and downloads these files, using the keys provided by the sender in a separate ...

5

ANALYSIS ON DISCRIMINATION INTERRUPTION TECHNIQUES IN DATA MINING

ANALYSIS ON DISCRIMINATION INTERRUPTION TECHNIQUES IN DATA MINING

... and knowledge discovery in databases are two new research areas that investigate the automatic extraction of previously unknown patterns from large amounts of ...useful knowledge from large ...

5

Analysis of Data Hiding Capacity in Sudoku Puzzles

Analysis of Data Hiding Capacity in Sudoku Puzzles

... Steganography method is like a hide and seeks game. It is a combination of arts and sciences of invisible communication. It is derived from the Greek words "stegos” means “cover” and “grafia” means “writing”, ...

11

Image Security Using Steganography And Cryptographic Techniques

Image Security Using Steganography And Cryptographic Techniques

... The word steganography is originally derived from Greek words which mean “Covered Writing”. It is defined as "hiding information within a noise; a way to supplement encryption, to prevent the existence of ...

6

An  Unconditionally  Hiding   and  Long-Term  Binding  Post-Quantum  Commitment  Scheme

An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme

... Especially for long-lived systems such as long-term archiving (e.g., [14]), one would like these security properties to both hold perfectly, i.e. even in the pres- ence of computationally unbounded adversaries. However, ...

25

Analysis and Implementation of High Efficient Steganography Using Patch Level sparse Representation

Analysis and Implementation of High Efficient Steganography Using Patch Level sparse Representation

... Many RDH algorithms have already been developed, such as image compression-based [1], [2], difference expansion based [3]–[7], histogram shift (HS)-based [8]–[11], image pixel pair based [12], [13], and dual/multi-image ...

5

Show all 10000 documents...

Related subjects