Steganographic file system

Results: 12



#Item
1Cryptography / Steganography / Mathematics / Steganalysis / Digital watermarking / JPEG / Error detection and correction / Subliminal channel / Embedding / Bit error rate / Steganography tools / Steganographic file system

A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
2Steganalysis / JPEG / Image noise / Jessica Fridrich / Steganographic file system / Cryptography / Steganography / Espionage

The Square Root Law of Steganographic Capacity Andrew D. Ker Tomáš Pevný Oxford University Computing Laboratory

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2008-06-09 14:47:20
3Steganographic file system / Serpent / Computer security / Tamper resistance / Ambient intelligence / Ross J. Anderson / Cryptography / Security / Lecture Notes in Computer Science

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
4Security / Information security / Plaintext / Computer file / Computer virus / Steganographic file system / Steganalysis / Cryptography / Espionage / Steganography

Steganography The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no iss

Add to Reading List

Source URL: www.mttgroup.ch

Language: English - Date: 2015-01-14 11:58:03
5Steganographic file system / Serpent / Computer security / Tamper resistance / Ambient intelligence / Ross J. Anderson / Cryptography / Security / Lecture Notes in Computer Science

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–[removed]M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
6Data deduplication / Data management / Steganographic file system / Crypt / Freenet / Backup / Public-key cryptography / Key size / Secure communication / Cryptography / Disk file systems / Data compression

Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2013-09-11 13:26:16
7Steganographic file system / System software / Data management / Filesystem-level encryption / StegFS / File system / Steganalysis / Steganography / Disk file systems / Espionage

PDF Document

Add to Reading List

Source URL: www.l3s.de

Language: English - Date: 2005-08-10 18:07:12
8Disk file systems / Concurrent computing / File sharing networks / Tapestry / Steganographic file system / Pastry / Freenet / Venti / Chord / Distributed data storage / Computing / Software

PDF Document

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2002-03-14 17:08:51
9Computing / Espionage / Cryptographic software / Steganographic file system / Steganography / File system / Password / Computer file / Deniable encryption / Cryptography / Disk file systems / Disk encryption

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 09:55:03
10Data management / Ext2 / Steganographic file system / Inode / Unix File System / StegFS / MINIX file system / File system / Filesystem-level encryption / Disk file systems / System software / Computing

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2000-03-01 17:25:38
UPDATE