The data-hiding technique ____ changes data from readable code to data that looks like binary executable code.
Select one:
a. partition hiding
b. marking bad clusters