Click here to Skip to main content
15,879,089 members

Articles by Corinna John (Articles: 26)

Articles: 26

RSS Feed

Average article rating: 4.81

High Performance Computing
Parallel Processing
17 Jun 2009   Updated: 18 Jun 2009   Rating: 4.91/5    Votes: 13   Popularity: 5.30
Licence: CPOL    Views: 88,067     Bookmarked: 11   Downloaded: 328
Please Sign up or sign in to vote.
First steps tutorial for Delphi developers.
Multimedia
GDI+
25 Jun 2004   Updated: 25 Jun 2004   Rating: 4.80/5    Votes: 26   Popularity: 6.71
Licence: CPOL    Views: 107,549     Bookmarked: 59   Downloaded: 3,622
Please Sign up or sign in to vote.
Hiding data of any kind in indexed Bitmaps like PNG and GIF.
2 Aug 2004   Updated: 12 Jul 2006   Rating: 4.81/5    Votes: 26   Popularity: 6.63
Licence: CPOL    Views: 113,582     Bookmarked: 61   Downloaded: 2,466
Please Sign up or sign in to vote.
Define regions inside an image to keep smooth colours free from hidden data.
Programming Languages
C#
3 Dec 2005   Updated: 17 Apr 2006   Rating: 4.87/5    Votes: 53   Popularity: 8.19
Licence: CPOL    Views: 190,519     Bookmarked: 162   Downloaded: 3,468
Please Sign up or sign in to vote.
What you never wanted to know about PCM.
12 Jun 2004   Updated: 12 Nov 2012   Rating: 4.94/5    Votes: 209   Popularity: 11.39
Licence: CPOL    Views: 2,012,812     Bookmarked: 511   Downloaded: 71,952
Please Sign up or sign in to vote.
Edit AVI files in .NET.
27 Aug 2003   Updated: 27 Aug 2003   Rating: 4.46/5    Votes: 31   Popularity: 6.52
Licence: CPOL    Views: 260,785     Bookmarked: 64   Downloaded: 4,328
Please Sign up or sign in to vote.
Managing privileges and impersonating users
1 Mar 2010   Updated: 1 Mar 2010   Rating: 4.99/5    Votes: 40   Popularity: 7.82
Licence: CPOL    Views: 48,011     Bookmarked: 44   Downloaded: 870
Please Sign up or sign in to vote.
Encode a message in the order of any list
22 Nov 2003   Updated: 22 Nov 2003   Rating: 4.58/5    Votes: 19   Popularity: 5.75
Licence: CDDL    Views: 75,004     Bookmarked: 29   Downloaded: 1,145
Please Sign up or sign in to vote.
An article about hiding instructions at the end of methods in an .NET Assembly
20 Sep 2003   Updated: 3 Apr 2004   Rating: 4.83/5    Votes: 19   Popularity: 5.95
Licence: CPOL    Views: 101,795     Bookmarked: 51   Downloaded: 4,837
Please Sign up or sign in to vote.
An article about spreading hidden data over many images.
4 Oct 2003   Updated: 3 Apr 2004   Rating: 4.76/5    Votes: 21   Popularity: 6.09
Licence: CPOL    Views: 209,212     Bookmarked: 64   Downloaded: 5,777
Please Sign up or sign in to vote.
An article about hiding each byte of a message bit-by-bit in eight pixels.
9 Apr 2004   Updated: 9 Apr 2004   Rating: 4.69/5    Votes: 29   Popularity: 6.10
Licence: CDDL    Views: 56,843     Bookmarked: 28   Downloaded: 1,073
Please Sign up or sign in to vote.
Another article about hiding bytes at the end of methods in a .NET Assembly.
24 Oct 2003   Updated: 19 May 2004   Rating: 4.90/5    Votes: 57   Popularity: 8.56
Licence: CPOL    Views: 512,152     Bookmarked: 116   Downloaded: 12,384
Please Sign up or sign in to vote.
An article about hiding bytes in the bitmap frames of uncompressed AVI files.
30 Aug 2003   Updated: 12 Jul 2004   Rating: 4.74/5    Votes: 64   Popularity: 8.39
Licence: CPOL    Views: 391,968     Bookmarked: 185   Downloaded: 11,306
Please Sign up or sign in to vote.
Hiding all kinds of data in the pixels of bitmaps.
4 Nov 2003   Updated: 5 Aug 2004   Rating: 4.94/5    Votes: 20   Popularity: 6.32
Licence: CDDL    Views: 133,514     Bookmarked: 47   Downloaded: 2,405
Please Sign up or sign in to vote.
An article about hiding bytes in the Program Change events of a MIDI file
27 May 2004   Updated: 29 Nov 2004   Rating: 4.36/5    Votes: 15   Popularity: 5.13
Licence: CPOL    Views: 71,943     Bookmarked: 28   Downloaded: 1,734
Please Sign up or sign in to vote.
Merging the pieces into one application.
3 Jun 2004   Updated: 29 Nov 2004   Rating: 4.47/5    Votes: 9   Popularity: 4.27
Licence: CPOL    Views: 87,861     Bookmarked: 33   Downloaded: 2,450
Please Sign up or sign in to vote.
Unsafe pixel modification and bitmaps from the clipboard.
22 Jan 2005   Updated: 22 Jan 2005   Rating: 4.83/5    Votes: 31   Popularity: 7.14
Licence: CPOL    Views: 76,548     Bookmarked: 37   Downloaded: 2,172
Please Sign up or sign in to vote.
A simple way to hide binary data in any kind of list
4 Jun 2005   Updated: 4 Jun 2005   Rating: 4.95/5    Votes: 41   Popularity: 7.88
Licence: CDDL    Views: 224,007     Bookmarked: 68   Downloaded: 6,666
Please Sign up or sign in to vote.
How to hide data of any kind inside a sound, and keep it alive on an analog medium.
16 Apr 2006   Updated: 16 Apr 2006   Rating: 4.98/5    Votes: 80   Popularity: 9.37
Licence: CPOL    Views: 498,209     Bookmarked: 114   Downloaded: 3,492
Please Sign up or sign in to vote.
How to zip and unzip files, avoiding the central directory.
2 Aug 2006   Updated: 2 Aug 2006   Rating: 5.00/5    Votes: 16   Popularity: 5.88
Licence: Not specified    Views: 107,473     Bookmarked: 57   Downloaded: 2
Please Sign up or sign in to vote.
From tutorial snippets to open source project
14 Nov 2004   Updated: 13 Mar 2008   Rating: 4.94/5    Votes: 45   Popularity: 8.07
Licence: CPOL    Views: 180,361     Bookmarked: 52   Downloaded: 1,702
Please Sign up or sign in to vote.
Some ideas on how to hide binary data in text documents
5 May 2004   Updated: 9 Apr 2012   Rating: 4.44/5    Votes: 36   Popularity: 6.80
Licence: CPOL    Views: 356,101     Bookmarked: 91   Downloaded: 11,719
Please Sign up or sign in to vote.
How to hide data of any kind inside a sound.
16 Nov 2007   Updated: 16 Nov 2007   Rating: 4.85/5    Votes: 29   Popularity: 6.94
Licence: CPOL    Views: 75,354     Bookmarked: 65   Downloaded: 934
Please Sign up or sign in to vote.
Transporting piggyback data in FTP transfers
Java
15 Feb 2017   Updated: 15 Feb 2017   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: CPOL    Views: 8,790     Bookmarked: 2   Downloaded: 78
Please Sign up or sign in to vote.
Fun with code and yarn
XML
1 Aug 2009   Updated: 1 Aug 2009   Rating: 5.00/5    Votes: 12   Popularity: 4.77
Licence: CPOL    Views: 40,715     Bookmarked: 25   Downloaded: 1,118
Please Sign up or sign in to vote.
Encode a message as waypoints in a GPX file.
Security
Encryption
15 Jan 2011   Updated: 15 Jan 2011   Rating: 4.98/5    Votes: 25   Popularity: 6.96
Licence: CPOL    Views: 61,926     Bookmarked: 42   Downloaded: 2,927
Please Sign up or sign in to vote.
Encode a text by sorting notes.

Average blogs rating:

No blogs have been submitted.

Average tips rating:

No tips have been posted.

Average reference rating:

No reference articles have been posted.

Average project rating:

No projects have been posted.
Software Developer
Germany Germany
Corinna lives in Hanover/Germany and works as a C# developer.