Academic literature on the topic 'Subliminal channel'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Subliminal channel.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Subliminal channel"

1

Rosario, Hector. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208. http://dx.doi.org/10.2307/4146896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rosario, Héctor. "Simmons' Subliminal Channel." College Mathematics Journal 35, no. 3 (2004): 208–12. http://dx.doi.org/10.1080/07468342.2004.11922074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (2022): 46. http://dx.doi.org/10.3390/cryptography6030046.

Full text
Abstract:
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specific axis. The second channel encodes subpixels on the basis of the encrypted message bits. It is designed to hide a wide range of data types. The third channel may be applied to a single share or multiple shares and is revealed when the proper parts of the shares are stacked. Fold and overlapping alg
APA, Harvard, Vancouver, ISO, and other styles
4

Harn, L., and G. Gong. "Digital signature with a subliminal channel." IEE Proceedings - Computers and Digital Techniques 144, no. 6 (1997): 387. http://dx.doi.org/10.1049/ip-cdt:19971511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Narn-Yih Lee and Pei-Hsiu Ho. "Digital signature with a threshold subliminal channel." IEEE Transactions on Consumer Electronics 49, no. 4 (2003): 1240–42. http://dx.doi.org/10.1109/tce.2003.1261223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cetnarski, Ryszard, Alberto Betella, Hielke Prins, Sid Kouider, and Paul F. M. J. Verschure. "Subliminal Response Priming in Mixed Reality: The Ecological Validity of a Classic Paradigm of Perception." Presence: Teleoperators and Virtual Environments 23, no. 1 (2014): 1–17. http://dx.doi.org/10.1162/pres_a_00171.

Full text
Abstract:
Subliminal stimuli can affect perception, decision-making, and action without being accessible to conscious awareness. Most evidence supporting this notion has been obtained in highly controlled laboratory conditions. Hence, its generalization to more realistic and ecologically valid contexts is unclear. Here, we investigate the impact of subliminal cues in an immersive navigation task using the so-called eXperience Induction Machine (XIM), a human accessible mixed-reality system. Subjects were asked to navigate through a maze at high speed. At irregular intervals, one group of subjects was ex
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Su, Cui Guohua, Yang Muxiang, and Chen Jing. "Threshold subliminal channel based on designated verifier signature." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1485–88. http://dx.doi.org/10.1007/bf02831803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Xuan Wu, and Yan Fu. "Optimized E-Cash Scheme and its Formal Analysis." Advanced Materials Research 204-210 (February 2011): 1322–25. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1322.

Full text
Abstract:
HCC (Hyper-elliptic Curves Cryptosystem) is a typical public key cryptosystem with high efficiency and security. In the paper, we introduced HCC into the designing of e-cash schemes and presented an improved e-cash scheme with formal security analysis. The basic cryptography algorithms in e-cash are based on the complexity of HCDLP (Hyper-elliptic Curves Discrete Logarithm Problem).This designing strategy improves the efficiency for software and hardware application and effectively reinforces the security of e-cash. Dishonest users and outer adversaries can not attack secret parameters with fe
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Narn-Yih, and Shu-Ya Yang. "The design of integrating subliminal channel with access control." Applied Mathematics and Computation 171, no. 1 (2005): 573–80. http://dx.doi.org/10.1016/j.amc.2005.01.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anjan, K., N. K. Srinath, and Abraham Jibi. "ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SECURED COMMUNICATION." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 39–53. https://doi.org/10.5281/zenodo.8252269.

Full text
Abstract:
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build robust covert channel over the network. From an attacker's perspective this will ameliorate by placing multiple such trapdoors in different protocols in the rudimentary protocol stack. This leads to a u
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Subliminal channel"

1

Коваленко, Богдан Анатолiйович, та Bohdan Kovalenko. "Методи побудови клептографiчних механiзмiв та систем стiйких до клептографiчних модифiкацiй". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44188.

Full text
Abstract:
Дисертацiя на здобуття наукового ступеня кандидата технiчних наук (доктора фiлософiї) за спецiальнiстю 05.13.21 «Системи захисту iнформацiї». – Нацiональний авiацiйний унiверситет, Мiнiстерство освiти i науки України, Київ, 2020. У дисертацiї розв’язано актуальну наукову задачу розробки методу побудови криптосистем з доведеною вiдсутнiстю клептографiчної модифiкацiї. Запропоновано загальну класифiкацiю клептографiчних систем, вперше запропоновано формалiзацiю для протоколiв типу «запит-вiдповiдь» у клептографiчному сенсi, вперше отриманi достатнi умови неможливостi непомiтної клептографiчної
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Chia-Feng, and 張佳峰. "Public-Key Based Subliminal and Subliminal-Free Channel." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/48029264762209468220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

楊淑雅. "Research and design of new subliminal channel technology." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/57099822742484155165.

Full text
Abstract:
碩士<br>南台科技大學<br>資訊管理系<br>92<br>With the development of Internet and information technology, people gradually depend on the convenience and speediness brought by the digital information. However, in the anonymous Internet, it is very easy to achieve the authentication of identities and the source of the information by digital signatures. Like Internet shopping, e-mail or the tax statement in the Internet, some researchers proposed digital signature systems that can embed the secret messages for secret communication. This kind of the digital signature looks like the same as the general digital s
APA, Harvard, Vancouver, ISO, and other styles
4

Ho, Pei-Hsiu, and 何佩修. "The Study of Digital Signature with a Subliminal Channel." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/89495170847100813068.

Full text
Abstract:
碩士<br>南台科技大學<br>資訊管理系<br>91<br>Simmons first proposed the concept of subliminal channel in 1983. Since then, many subliminal channels based on digital signatures are proposed. Up to now, only a fixed number of subliminal messages can be hidden in a digital signature and the content of the subliminal messages cannot be changed after the signature is generated. Moreover, the sender has to share a secret key with the subliminal receivers. Chaum and Antwerpen, in 1989, proposed the concept of the undeniable signature which cannot be verified without the signer’s cooperation. Later, Chaum also prop
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Chien-Hung, and 陳建宏. "Using Subliminal Channel Mechanism to Defend Against the Insider Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/52904837083392712115.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊工程系碩士班<br>101<br>Due to the rapid development of the Internet, many applications of Internet are widely used. It brings convenient, but derives many problems. We often hear news about insider trading in different enterprises, the cheating case of engineer commercial spying, etc. The security of Internet becomes an important issue in the transaction. In this thesis, we proposed two schemes to apply in different environment. In the first scheme, we defend against the illegal insider trading of enterprises to construct an investigator unearths illegal behavior via a subliminal c
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Chao-Lin, and 楊朝麟. "Asymmetric Subliminal Channels in Digital Signatures." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/03741747045365531926.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>94<br>Abstract In the age of information explosion, our life is full of security crises. Thus, the information security is an important research to protect our right in this hi-tech environment. Obviously, the privacy of communications is a key issue of information security. Subliminal channels in digital signatures are good solutions to guarantee the privacy of communications. Outsiders treat the signature as an ordinary verifiable one, only the designated receiver can detect and extract a subliminal message from that signature. Furthermore, since subliminal cha
APA, Harvard, Vancouver, ISO, and other styles
7

Hung, Jia-Jung, and 洪嘉駿. "Subliminal Channels in the Ring Signature." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/55382818800961605320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Dai-Rui, and 林岱銳. "Multiple Subliminal Channels and Chameleon Hash Functions and Their Applications." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/84963396637494970360.

Full text
Abstract:
博士<br>國立中山大學<br>資訊工程學系研究所<br>98<br>A digital signature technique has evolved into varies digital signature schemes in different application environments. In general, a digital signature consists of a random number and a hash function in addition to signing function. The random number can be used to provide the randomization of digital signatures. The hash function can be used for generating a message digest that has a fix length and is convenient for signing. The random number that hides in the digital signature is a useful factor. If we can use this factor well, then the digital signature ca
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Subliminal channel"

1

Joyce, Shulman, and Rafferty Gerald P, eds. Subliminal: The new channel to personal power. InfoBooks, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pouvoir Subliminal: Changez de Vision... Changez de Vie. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ganeri, Jonardon. The Disunity of Mind. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198757405.003.0009.

Full text
Abstract:
The term ‘mind’ (mano) is used in a confused range of different and contradictory senses in the early Pāli canon. Buddhaghosa will impose order by distinguishing distinct cognitive modules, each with its proper domain of cognitive work. Early perception, the subliminal orienting, and initial reception of a stimulus into the perceptual process, is the function of ‘mind-element’ (mano-dhātu), a low-level cognitive system. Late perception and working memory is the function of a high-level cognitive system, ‘mind-discrimination-element’ (mano-viññāṇa-dhātu). In deference to ancient Buddhist tradit
APA, Harvard, Vancouver, ISO, and other styles
4

Cyna, Allan M., Suyin GM Tan, Marion I. Andrew, Laura L. Burgoyne, and Scott W. Simmons, eds. Handbook of Communication in Anaesthesia, Pain Management, and Intensive Care. 2nd ed. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/med/9780198858669.001.0001.

Full text
Abstract:
Abstract Learning more about communication is an effective strategy for improving patient safety, making teams work, and resolving complaints. Perhaps most importantly, good communication skills allow the development of expertise and professionalism in all interactions whether with patients, colleagues, trainees, or even administrators! Communication at its heart, is the means of expressing both to ourselves and others, how we perceive and influence the world around us. It is a tool for exchanging information and meaning, but also a way to connect with others. The many human dimensions of comm
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Subliminal channel"

1

Zhao, Xianfeng, and Ning Li. "Reversible Watermarking with Subliminal Channel." In Information Hiding. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88961-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kobara, Kazukuni, and Hideki Imai. "On the Channel Capacity of Narrow-Band Subliminal Channels." In Information and Communication Security. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-47942-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Young, Adam, and Moti Yung. "A Subliminal Channel in Secret Block Ciphers." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Teşeleanu, George. "Subliminal Hash Channels." In Algebra, Codes and Cryptology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36237-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simmons, Gustavus J. "The history of subliminal channels." In Information Hiding. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61996-8_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Burmester, Mike, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, and Moti Yung. "A progress report on subliminal-free channels." In Information Hiding. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61996-8_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bohli, Jens-Matthias, and Rainer Steinwandt. "On Subliminal Channels in Deterministic Signature Schemes." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496618_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gururaja, H. S., M. Seetha, and Anjan K. Koundinya. "Covertness Analysis of Subliminal Channels in Legitimate Communication." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29280-4_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kobara, Kazukuni, and Hideki Imai. "Self-synchronized message randomization methods for subliminal channels." In Information and Communications Security. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sakurai, Kouichi, and Toshiya Itoh. "Subliminal channels for signature transfer and their application to signature distribution schemes." In Advances in Cryptology — AUSCRYPT '92. Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57220-1_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Subliminal channel"

1

Hartl, Alexander, Robert Annessi, and Tanja Zseby. "A Subliminal Channel in EdDSA." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139923.3139925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xuanwu Zhou and Ping Wei. "Threshold signature scheme with subliminal channel." In 2009 Chinese Control and Decision Conference (CCDC). IEEE, 2009. http://dx.doi.org/10.1109/ccdc.2009.5192262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Cheng, Jianbo Liu, and Yaqing Niu. "Robust Watermark Model Based on Subliminal Channel." In 2007 International Conference on Computational Intelligence and Security (CIS 2007). IEEE, 2007. http://dx.doi.org/10.1109/cis.2007.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Jianhui, and Tao Yang. "Subliminal Channel and Digital Currency Pay Security." In 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2018. http://dx.doi.org/10.1109/icitbs.2018.00041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xiangjun, Xin, and Li Qingbo. "Construction of Subliminal Channel in ID-Based Signatures." In 2009 WASE International Conference on Information Engineering (ICIE). IEEE, 2009. http://dx.doi.org/10.1109/icie.2009.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Jian-hong, Peng-yan Li, and Xu-bing Zhao. "A novel group signature scheme with subliminal channel." In 2015 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015). WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789813140011_0072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xin Xiangjun and Zhi Guizhen. "A New Digital Signature Scheme with Threshold Subliminal Channel." In 2009 WASE International Conference on Information Engineering (ICIE). IEEE, 2009. http://dx.doi.org/10.1109/icie.2009.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Xuanwu. "Threshold Cryptosystem and Its Application in Subliminal Channel Scheme." In 2008 Second International Symposium on Intelligent Information Technology Application (IITA). IEEE, 2008. http://dx.doi.org/10.1109/iita.2008.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Zhenyou, Wei Gao, Li'e Chen, and Fei Li. "Perfect Subliminal Channel in a Paring-Based Digital Signature." In 2009 International Conference on Computational Intelligence and Security. IEEE, 2009. http://dx.doi.org/10.1109/cis.2009.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Su, Li, Muxiang Yang, Jun Li, and Guohua Cui. "Secure Anonymous Threshold Subliminal Channel for Ad Hoc Environments." In 2006 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2006. http://dx.doi.org/10.1109/wicom.2006.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!