Publication Date
In 2024 | 0 |
Since 2023 | 0 |
Since 2020 (last 5 years) | 3 |
Since 2015 (last 10 years) | 5 |
Since 2005 (last 20 years) | 8 |
Descriptor
Computer Security | 5 |
Coding | 3 |
Internet | 3 |
Programming | 3 |
Color | 2 |
Computer Science | 2 |
Computer Science Education | 2 |
Information Security | 2 |
Information Technology | 2 |
Problem Solving | 2 |
Textbooks | 2 |
More ▼ |
Source
International Journal of… | 2 |
IEEE Transactions on Education | 1 |
Information Systems Education… | 1 |
Journal of Academic Ethics | 1 |
Journal of Science Education… | 1 |
Mathematics and Computer… | 1 |
ProQuest LLC | 1 |
Author
Annessi, Robert | 1 |
Banerjee, Tanvi | 1 |
Banik, Barnali Gupta | 1 |
Bernhardt, Valentin | 1 |
Courtney, Mary F. | 1 |
Davies, Ross | 1 |
Debnath, Diptasree | 1 |
Frkat, Davor | 1 |
Ghosh, Emlon | 1 |
Johnson, Clare | 1 |
Kempner, Yulia | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 5 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Austria (Vienna) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Johnson, Clare; Davies, Ross – Journal of Academic Ethics, 2020
Contract cheating is a major problem in Higher Education because it is very difficult to detect using traditional plagiarism detection tools. Digital forensics techniques are already used in law to determine ownership of documents, and also in criminal cases, where it is not uncommon to hide information and images within an ordinary looking…
Descriptors: Crime, Technology Uses in Education, Cheating, Educational Technology
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Romine, William L.; Banerjee, Tanvi – Journal of Science Education and Technology, 2012
Exemplary science instructors use inquiry to tailor content to student's learning needs; traditional textbooks treat science as a set of facts and a rigid curriculum. Publishers now allow instructors to compile pieces of published and/or self-authored text to make custom textbooks. This brings numerous advantages, including the ability to produce…
Descriptors: Evidence, Student Attitudes, Textbooks, Teaching Models
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages