Click here to Skip to main content
15,744,193 members

Articles by Corinna John (Articles: 26)

Articles: 26

RSS Feed

Average article rating: 4.81

High Performance Computing
Parallel Processing
17 Jun 2009   Updated: 18 Jun 2009   Rating: 4.91/5    Votes: 13   Popularity: 5.30
Licence: CPOL    Views: 84,666     Bookmarked: 11   Downloaded: 327
Please Sign up or sign in to vote.
First steps tutorial for Delphi developers.
Multimedia
GDI+
25 Jun 2004   Updated: 25 Jun 2004   Rating: 4.80/5    Votes: 26   Popularity: 6.71
Licence: CPOL    Views: 105,479     Bookmarked: 59   Downloaded: 3,613
Please Sign up or sign in to vote.
Hiding data of any kind in indexed Bitmaps like PNG and GIF.
2 Aug 2004   Updated: 12 Jul 2006   Rating: 4.81/5    Votes: 26   Popularity: 6.63
Licence: CPOL    Views: 111,632     Bookmarked: 61   Downloaded: 2,456
Please Sign up or sign in to vote.
Define regions inside an image to keep smooth colours free from hidden data.
Programming Languages
C#
3 Dec 2005   Updated: 17 Apr 2006   Rating: 4.87/5    Votes: 53   Popularity: 8.19
Licence: CPOL    Views: 186,185     Bookmarked: 162   Downloaded: 3,451
Please Sign up or sign in to vote.
What you never wanted to know about PCM.
12 Jun 2004   Updated: 12 Nov 2012   Rating: 4.94/5    Votes: 209   Popularity: 11.39
Licence: CPOL    Views: 1,934,117     Bookmarked: 511   Downloaded: 71,725
Please Sign up or sign in to vote.
Edit AVI files in .NET.
27 Aug 2003   Updated: 27 Aug 2003   Rating: 4.46/5    Votes: 31   Popularity: 6.52
Licence: CPOL    Views: 254,732     Bookmarked: 64   Downloaded: 4,291
Please Sign up or sign in to vote.
Managing privileges and impersonating users
1 Mar 2010   Updated: 1 Mar 2010   Rating: 4.99/5    Votes: 40   Popularity: 7.82
Licence: CPOL    Views: 46,151     Bookmarked: 44   Downloaded: 865
Please Sign up or sign in to vote.
Encode a message in the order of any list
22 Nov 2003   Updated: 22 Nov 2003   Rating: 4.58/5    Votes: 19   Popularity: 5.75
Licence: CDDL    Views: 73,933     Bookmarked: 29   Downloaded: 1,142
Please Sign up or sign in to vote.
An article about hiding instructions at the end of methods in an .NET Assembly
20 Sep 2003   Updated: 3 Apr 2004   Rating: 4.83/5    Votes: 19   Popularity: 5.95
Licence: CPOL    Views: 99,753     Bookmarked: 51   Downloaded: 4,823
Please Sign up or sign in to vote.
An article about spreading hidden data over many images.
4 Oct 2003   Updated: 3 Apr 2004   Rating: 4.76/5    Votes: 21   Popularity: 6.09
Licence: CPOL    Views: 204,861     Bookmarked: 64   Downloaded: 5,771
Please Sign up or sign in to vote.
An article about hiding each byte of a message bit-by-bit in eight pixels.
9 Apr 2004   Updated: 9 Apr 2004   Rating: 4.69/5    Votes: 29   Popularity: 6.10
Licence: CDDL    Views: 56,051     Bookmarked: 28   Downloaded: 1,068
Please Sign up or sign in to vote.
Another article about hiding bytes at the end of methods in a .NET Assembly.
24 Oct 2003   Updated: 19 May 2004   Rating: 4.89/5    Votes: 56   Popularity: 8.52
Licence: CPOL    Views: 499,786     Bookmarked: 116   Downloaded: 12,359
Please Sign up or sign in to vote.
An article about hiding bytes in the bitmap frames of uncompressed AVI files.
30 Aug 2003   Updated: 12 Jul 2004   Rating: 4.74/5    Votes: 64   Popularity: 8.39
Licence: CPOL    Views: 382,938     Bookmarked: 185   Downloaded: 11,277
Please Sign up or sign in to vote.
Hiding all kinds of data in the pixels of bitmaps.
4 Nov 2003   Updated: 5 Aug 2004   Rating: 4.94/5    Votes: 20   Popularity: 6.32
Licence: CDDL    Views: 129,973     Bookmarked: 47   Downloaded: 2,401
Please Sign up or sign in to vote.
An article about hiding bytes in the Program Change events of a MIDI file
27 May 2004   Updated: 29 Nov 2004   Rating: 4.36/5    Votes: 15   Popularity: 5.13
Licence: CPOL    Views: 70,673     Bookmarked: 28   Downloaded: 1,732
Please Sign up or sign in to vote.
Merging the pieces into one application.
3 Jun 2004   Updated: 29 Nov 2004   Rating: 4.47/5    Votes: 9   Popularity: 4.27
Licence: CPOL    Views: 86,891     Bookmarked: 33   Downloaded: 2,442
Please Sign up or sign in to vote.
Unsafe pixel modification and bitmaps from the clipboard.
22 Jan 2005   Updated: 22 Jan 2005   Rating: 4.83/5    Votes: 31   Popularity: 7.14
Licence: CPOL    Views: 75,114     Bookmarked: 37   Downloaded: 2,163
Please Sign up or sign in to vote.
A simple way to hide binary data in any kind of list
4 Jun 2005   Updated: 4 Jun 2005   Rating: 4.95/5    Votes: 41   Popularity: 7.88
Licence: CDDL    Views: 220,043     Bookmarked: 68   Downloaded: 6,649
Please Sign up or sign in to vote.
How to hide data of any kind inside a sound, and keep it alive on an analog medium.
16 Apr 2006   Updated: 16 Apr 2006   Rating: 4.98/5    Votes: 80   Popularity: 9.37
Licence: CPOL    Views: 485,776     Bookmarked: 114   Downloaded: 3,434
Please Sign up or sign in to vote.
How to zip and unzip files, avoiding the central directory.
2 Aug 2006   Updated: 2 Aug 2006   Rating: 5.00/5    Votes: 16   Popularity: 5.88
Licence: Not specified    Views: 104,912     Bookmarked: 57   Downloaded: 2
Please Sign up or sign in to vote.
From tutorial snippets to open source project
14 Nov 2004   Updated: 13 Mar 2008   Rating: 4.94/5    Votes: 45   Popularity: 8.07
Licence: CPOL    Views: 175,575     Bookmarked: 52   Downloaded: 1,696
Please Sign up or sign in to vote.
Some ideas on how to hide binary data in text documents
5 May 2004   Updated: 9 Apr 2012   Rating: 4.44/5    Votes: 36   Popularity: 6.80
Licence: CPOL    Views: 348,056     Bookmarked: 91   Downloaded: 11,706
Please Sign up or sign in to vote.
How to hide data of any kind inside a sound.
16 Nov 2007   Updated: 16 Nov 2007   Rating: 4.85/5    Votes: 29   Popularity: 6.94
Licence: CPOL    Views: 73,503     Bookmarked: 65   Downloaded: 929
Please Sign up or sign in to vote.
Transporting piggyback data in FTP transfers
Java
15 Feb 2017   Updated: 15 Feb 2017   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: CPOL    Views: 8,300     Bookmarked: 2   Downloaded: 74
Please Sign up or sign in to vote.
Fun with code and yarn
XML
1 Aug 2009   Updated: 1 Aug 2009   Rating: 5.00/5    Votes: 12   Popularity: 4.77
Licence: CPOL    Views: 39,373     Bookmarked: 25   Downloaded: 1,110
Please Sign up or sign in to vote.
Encode a message as waypoints in a GPX file.
Security
Encryption
15 Jan 2011   Updated: 15 Jan 2011   Rating: 4.98/5    Votes: 25   Popularity: 6.96
Licence: CPOL    Views: 58,684     Bookmarked: 42   Downloaded: 2,875
Please Sign up or sign in to vote.
Encode a text by sorting notes.

Average blogs rating:

No blogs have been submitted.

Average tips rating:

No tips have been posted.

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Software Developer
Germany Germany
Corinna lives in Hanover/Germany and works as a C# developer.