(redirected from Data hiding)
Also found in: Thesaurus, Medical, Encyclopedia.
Related to Data hiding: Data abstraction


v. en·cap·su·lat·ed, en·cap·su·lat·ing, en·cap·su·lates
1. To encase in or as if in a capsule.
2. To express in a brief summary; epitomize: headlines that encapsulate the news.
To become encapsulated.

en·cap′su·la′tion n.
en·cap′su·la′tor n.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.encapsulation - the condition of being enclosed (as in a capsule); "the encapsulation of tendons in membranous sheaths"
condition, status - a state at a particular time; "a condition (or state) of disrepair"; "the current status of the arms negotiations"
2.encapsulation - the process of enclosing (as in a capsule)
physical process, process - a sustained phenomenon or one marked by gradual changes through a series of states; "events now in process"; "the process of calcification begins later for boys than for girls"
blocage de déchets radioactifsenrobage de déchets radioactifsmise en boîtier


[ɪnˌkæpsjuˈleɪʃən] n [+ mood, spirit, essence] → incarnation f
References in periodicals archive ?
We were inspired by a data hiding technique to design an effective compression method to eliminate the indicators of LAS; the purpose of the proposed method is to improve the compression rate of traditional LAS.
Data hiding algorithms [1] conceal a secret message inside a digital cover media, and this stego media with the embedded message is subsequently transmitted over the Internet.
Data hiding and cryptography are the two techniques which are used to secure the communication.
Data hiding approaches [3, 6, 11] investigate about maintaining the privacy of data or information before applying the data mining techniques on the database.
Keywords: Least significant bit replacement, Image hiding, Pixel-value differencing, Steganography, Data hiding.
Reversible data hiding techniques can be classified into two approaches: spatial domain and transform domain.
Within the Evidence Examination vulnerability, respondents are asked questions regarding preparation, physical extraction, logical extraction, timeframe analysis, data hiding analysis, application/file analysis, and ownership/possession threats and countermeasures.
Data hiding has become very important and useful recently because of the advancement of technology and ability to hack or falsely obtain data or information [2].
Reversible data hiding has improved to this demand [6, 7].
Among the topics discussed are: automatic intrusion detection and secret multi agent preservation using authentication measurement network threat; a high level view of cryptographic hash function; a crime profiling system based on self-organizing map; biometric security; data hiding schemes based on singular value decomposition; a Malay language text-based anti-spam system using a neural network; the impact of big data on security; trust determination in wireless ad hoc networks; security impacts on social media platforms; and security in digital images.
In 1993 Trikel used the term Digital Watermarking" for the first time while presenting two technique for data hiding in digital images[1].