Click here to Skip to main content
15,309,563 members

Articles by Corinna John (Articles: 26)

Articles: 26

RSS Feed

Average article rating: 4.81

High Performance Computing
Parallel Processing
17 Jun 2009   Updated: 18 Jun 2009   Rating: 4.91/5    Votes: 13   Popularity: 5.30
Licence: CPOL    Views: 79,795     Bookmarked: 11   Downloaded: 322
Please Sign up or sign in to vote.
First steps tutorial for Delphi developers.
Multimedia
GDI+
25 Jun 2004   Updated: 25 Jun 2004   Rating: 4.80/5    Votes: 26   Popularity: 6.71
Licence: CPOL    Views: 101,977     Bookmarked: 59   Downloaded: 3,582
Please Sign up or sign in to vote.
Hiding data of any kind in indexed Bitmaps like PNG and GIF.
2 Aug 2004   Updated: 12 Jul 2006   Rating: 4.81/5    Votes: 26   Popularity: 6.63
Licence: CPOL    Views: 108,552     Bookmarked: 61   Downloaded: 2,435
Please Sign up or sign in to vote.
Define regions inside an image to keep smooth colours free from hidden data.
Programming Languages
C#
3 Dec 2005   Updated: 17 Apr 2006   Rating: 4.87/5    Votes: 53   Popularity: 8.19
Licence: CPOL    Views: 180,505     Bookmarked: 163   Downloaded: 3,410
Please Sign up or sign in to vote.
What you never wanted to know about PCM.
12 Jun 2004   Updated: 12 Nov 2012   Rating: 4.94/5    Votes: 209   Popularity: 11.39
Licence: CPOL    Views: 1,777,941     Bookmarked: 512   Downloaded: 70,806
Please Sign up or sign in to vote.
Edit AVI files in .NET.
27 Aug 2003   Updated: 27 Aug 2003   Rating: 4.46/5    Votes: 31   Popularity: 6.52
Licence: CPOL    Views: 245,021     Bookmarked: 64   Downloaded: 4,188
Please Sign up or sign in to vote.
Managing privileges and impersonating users
1 Mar 2010   Updated: 1 Mar 2010   Rating: 4.99/5    Votes: 40   Popularity: 7.82
Licence: CPOL    Views: 43,551     Bookmarked: 43   Downloaded: 855
Please Sign up or sign in to vote.
Encode a message in the order of any list
22 Nov 2003   Updated: 22 Nov 2003   Rating: 4.58/5    Votes: 19   Popularity: 5.75
Licence: CDDL    Views: 72,023     Bookmarked: 29   Downloaded: 1,140
Please Sign up or sign in to vote.
An article about hiding instructions at the end of methods in an .NET Assembly
20 Sep 2003   Updated: 3 Apr 2004   Rating: 4.83/5    Votes: 19   Popularity: 5.95
Licence: CPOL    Views: 97,201     Bookmarked: 51   Downloaded: 4,797
Please Sign up or sign in to vote.
An article about spreading hidden data over many images.
4 Oct 2003   Updated: 3 Apr 2004   Rating: 4.76/5    Votes: 21   Popularity: 6.09
Licence: CPOL    Views: 199,799     Bookmarked: 64   Downloaded: 5,762
Please Sign up or sign in to vote.
An article about hiding each byte of a message bit-by-bit in eight pixels.
9 Apr 2004   Updated: 9 Apr 2004   Rating: 4.69/5    Votes: 29   Popularity: 6.10
Licence: CDDL    Views: 54,871     Bookmarked: 28   Downloaded: 1,062
Please Sign up or sign in to vote.
Another article about hiding bytes at the end of methods in a .NET Assembly.
24 Oct 2003   Updated: 19 May 2004   Rating: 4.89/5    Votes: 56   Popularity: 8.52
Licence: CPOL    Views: 483,914     Bookmarked: 116   Downloaded: 12,327
Please Sign up or sign in to vote.
An article about hiding bytes in the bitmap frames of uncompressed AVI files.
30 Aug 2003   Updated: 12 Jul 2004   Rating: 4.74/5    Votes: 64   Popularity: 8.39
Licence: CPOL    Views: 367,674     Bookmarked: 185   Downloaded: 11,182
Please Sign up or sign in to vote.
Hiding all kinds of data in the pixels of bitmaps.
4 Nov 2003   Updated: 5 Aug 2004   Rating: 4.94/5    Votes: 20   Popularity: 6.32
Licence: CDDL    Views: 124,433     Bookmarked: 47   Downloaded: 2,377
Please Sign up or sign in to vote.
An article about hiding bytes in the Program Change events of a MIDI file
27 May 2004   Updated: 29 Nov 2004   Rating: 4.36/5    Votes: 15   Popularity: 5.13
Licence: CPOL    Views: 69,193     Bookmarked: 28   Downloaded: 1,728
Please Sign up or sign in to vote.
Merging the pieces into one application.
3 Jun 2004   Updated: 29 Nov 2004   Rating: 4.47/5    Votes: 9   Popularity: 4.27
Licence: CPOL    Views: 85,321     Bookmarked: 33   Downloaded: 2,436
Please Sign up or sign in to vote.
Unsafe pixel modification and bitmaps from the clipboard.
22 Jan 2005   Updated: 22 Jan 2005   Rating: 4.83/5    Votes: 31   Popularity: 7.14
Licence: CPOL    Views: 72,744     Bookmarked: 37   Downloaded: 2,148
Please Sign up or sign in to vote.
A simple way to hide binary data in any kind of list
4 Jun 2005   Updated: 4 Jun 2005   Rating: 4.95/5    Votes: 41   Popularity: 7.88
Licence: CDDL    Views: 213,953     Bookmarked: 68   Downloaded: 6,626
Please Sign up or sign in to vote.
How to hide data of any kind inside a sound, and keep it alive on an analog medium.
16 Apr 2006   Updated: 16 Apr 2006   Rating: 4.98/5    Votes: 79   Popularity: 9.34
Licence: CPOL    Views: 473,766     Bookmarked: 115   Downloaded: 3,244
Please Sign up or sign in to vote.
How to zip and unzip files, avoiding the central directory.
2 Aug 2006   Updated: 2 Aug 2006   Rating: 5.00/5    Votes: 16   Popularity: 5.88
Licence: Not specified    Views: 101,212     Bookmarked: 57   Downloaded: 2
Please Sign up or sign in to vote.
From tutorial snippets to open source project
14 Nov 2004   Updated: 13 Mar 2008   Rating: 4.94/5    Votes: 45   Popularity: 8.07
Licence: CPOL    Views: 168,775     Bookmarked: 52   Downloaded: 1,680
Please Sign up or sign in to vote.
Some ideas on how to hide binary data in text documents
5 May 2004   Updated: 9 Apr 2012   Rating: 4.44/5    Votes: 36   Popularity: 6.80
Licence: CPOL    Views: 335,616     Bookmarked: 91   Downloaded: 11,658
Please Sign up or sign in to vote.
How to hide data of any kind inside a sound.
16 Nov 2007   Updated: 16 Nov 2007   Rating: 4.85/5    Votes: 29   Popularity: 6.94
Licence: CPOL    Views: 70,813     Bookmarked: 65   Downloaded: 925
Please Sign up or sign in to vote.
Transporting piggyback data in FTP transfers
Java
15 Feb 2017   Updated: 15 Feb 2017   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: CPOL    Views: 7,240     Bookmarked: 2   Downloaded: 71
Please Sign up or sign in to vote.
Fun with code and yarn
XML
1 Aug 2009   Updated: 1 Aug 2009   Rating: 5.00/5    Votes: 12   Popularity: 4.77
Licence: CPOL    Views: 37,653     Bookmarked: 25   Downloaded: 1,084
Please Sign up or sign in to vote.
Encode a message as waypoints in a GPX file.
Security
Encryption
15 Jan 2011   Updated: 15 Jan 2011   Rating: 4.98/5    Votes: 25   Popularity: 6.96
Licence: CPOL    Views: 54,574     Bookmarked: 42   Downloaded: 2,834
Please Sign up or sign in to vote.
Encode a text by sorting notes.

Average blogs rating:

No blogs have been submitted.

Average tips rating:

No tips have been posted.

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Corinna John
Software Developer
Germany Germany
Corinna lives in Hanover/Germany and works as a C# developer.