(redirected from Information hiding)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia, Wikipedia.


Taking from someone with an intent to injure or defraud.

Wrongful abstraction is an unauthorized and illegal withdrawing of funds or an appropriation of someone else's funds for the taker's own benefit. It may be a crime under the laws of a state. It is different from Embezzlement, which is a crime committed only if the taker had a lawful right to possession of the money when it was first taken.

See: concept, generality, idea, impalpability, larceny, notion, preoccupation, vision
References in periodicals archive ?
They cover information hiding for audio and speech, for images and video, for text and binary data, and for multimedia.
IT Services Industry: Steganography: Future of Information Hiding (Technical Insights)
In the training step, the feature classifier is trained by the database composed of both plain images and stego images (generated by using different information hiding methods).
The Second IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06) held in Pasadena, California during December 18-20, 2006; gathered individual researchers who are also the world's most respected authorities on both the fields of information hiding and multimedia signal processing.
For more information, check out: Information Hiding Techniques for Steganography and Digital Watermarking edited by Stefan Katzenbeisser and Fabien A.
In his book Information Hiding, Techniques for steganography and Digital Watermarking, Fabien A.
The author's background combines maths, coding, and machine learning with information hiding, meaning the complex statistical theory is made accessible to those new to machine learning.
They cover access control; applications of cryptography; cloud computing; communication and information systems; computer networks; cryptographic protocols and functions; foundations of computer security; grid computing; identity and trust management; image and video processing; information hiding and watermarking; network communication; intelligent networked systems; intrusion detection, tolerance, and prevention; mobile, ad hoc, and sensor network security; network architecture and protocol design; peer-to-peer computing; parallel and distributed systems; security modeling and architecture; sensor networks; service computing; signal and information processing; and wireless networks.
The symposium's 260 peer-reviewed papers, prepared by researchers and practitioners from academia, industry, and government, are organized into sections on applied cryptography, enterprise integration applications and electronic payment, information hiding and watermarking, information security, innovative e-business models and electronic commerce applications, intelligent computing and networks, intelligent systems and international finance, mobile commerce, multimedia technology and applications, risk analysis and business process integration, sensor networks, web applications, wireless sensor networks, and miscellaneous topics.
However, the encrypted form may attract special attention of network warders and is thus not fully secret, Current information hiding techniques are developed to deceive warders by embedding messages into multimedia in an imperceptible manner, but still maintain their original formats and quality.

Full browser ?