(redirected from Data hiding)
Also found in: Thesaurus, Medical, Encyclopedia.
Related to Data hiding: Data abstraction


v. en·cap·su·lat·ed, en·cap·su·lat·ing, en·cap·su·lates
1. To encase in or as if in a capsule.
2. To express in a brief summary; epitomize: headlines that encapsulate the news.
To become encapsulated.

en·cap′su·la′tion n.
en·cap′su·la′tor n.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.encapsulation - the condition of being enclosed (as in a capsule); "the encapsulation of tendons in membranous sheaths"
condition, status - a state at a particular time; "a condition (or state) of disrepair"; "the current status of the arms negotiations"
2.encapsulation - the process of enclosing (as in a capsule)
physical process, process - a sustained phenomenon or one marked by gradual changes through a series of states; "events now in process"; "the process of calcification begins later for boys than for girls"
blocage de déchets radioactifsenrobage de déchets radioactifsmise en boîtier


[ɪnˌkæpsjuˈleɪʃən] n [+ mood, spirit, essence] → incarnation f
References in periodicals archive ?
Revealing data hiding in social photos presents marketers' with a new way to understand consumers and industries while further enabling a more consolidated source of social media.
Data Encryption, Data Hiding and Steganography, DOS Attacks and Distributed DOS Attacks, along with Phishing Attacks & Open Redirection Attacks, Cross Site Scripting Attacks and Data Sniffing & ARP Poisoning will feature in the seminar.
8220;Persystent quickly and seamlessly prevents that data hiding in proverbial dark corners from being disclosed and appropriated by unauthorized users.
The group divided the 65 challenges among nine categories, including architecture, data collection, analysis, standards, training, and "anti-forensics" (such as data hiding and malware).
Data hiding exercises provide examples of how features of commonly used software enable the hiding of data.
Regulatory Compliance: Additional refinements to Attachmate's patent-pending data hiding features on IBM host screens enable organizations to adhere to PCI DSS compliance requirements and equip them for the PCI audit process.
It remains one of the most popular data hiding schemes for palette-based images similar to the commonly used LSB method for 24-bit colour images or 8-bit grayscale images [Andreas & Andreas 1999].
Blind image data hiding based on self reference," in Pattern Recognition Letters, 2004.
The 18 chapters also survey hardware implementations of image and video watermarking algorithms, develop a spread spectrum watermark system using FPGA, apply error control coding to multimedia watermarking technologies, and describe a framework for data hiding that exploits spectral properties of the Fourier magnitude and phase of natural images.
However the methods we presented here can be applied to the study of data hiding in color images, video, and audio.
For instance, digital images are often used to embed covert information; the limited capability of human vision allows data hiding or watermarking of this type of media.
Some others may even think of the possibility of conveying a computer virus or Trojan horse programs via data hiding techniques.