Steganography

Results: 318



#Item
1Outguess How to hide your secret information in plain sight Stego: Outguess Hide your private data in ordinary files with this most excellent steganography program and the curiously named Nate Drake.

Outguess How to hide your secret information in plain sight Stego: Outguess Hide your private data in ordinary files with this most excellent steganography program and the curiously named Nate Drake.

Add to Reading List

Source URL: s3.amazonaws.com

- Date: 2017-04-11 07:54:13
    2WWWTrack: Data Mining  Session: Mining in Social Networks Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography

    WWWTrack: Data Mining Session: Mining in Social Networks Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography

    Add to Reading List

    Source URL: pdfs.semanticscholar.org

    - Date: 2015-07-28 21:05:41
      3Steganography Jenny Hong Stephen Boyd  EE103

      Steganography Jenny Hong Stephen Boyd EE103

      Add to Reading List

      Source URL: stanford.edu

      - Date: 2015-12-03 12:07:01
        4ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-02-05 03:43:20
        5High capacity image steganographic model Y.K.Lee and L.H.Chen Abstract: Steganography is an ancient art o r conveying messages in a secret way thal only Ihe receiver knows the existence of a message. So a fundamental req

        High capacity image steganographic model Y.K.Lee and L.H.Chen Abstract: Steganography is an ancient art o r conveying messages in a secret way thal only Ihe receiver knows the existence of a message. So a fundamental req

        Add to Reading List

        Source URL: debut.cis.nctu.edu.tw

        Language: English - Date: 2013-07-12 03:09:44
        6CrossMark_Color_Stacked_p

        CrossMark_Color_Stacked_p

        Add to Reading List

        Source URL: debut.cis.nctu.edu.tw

        Language: English - Date: 2014-08-15 02:06:04
        7Microsoft Word - Available Technologies - Sam Houston

        Microsoft Word - Available Technologies - Sam Houston

        Add to Reading List

        Source URL: gato-docs.its.txstate.edu

        Language: English - Date: 2016-08-09 20:27:47
        8SESSION ID: GPS2-F04  A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

        SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

        Add to Reading List

        Source URL: www.rsaconference.com

        Language: English - Date: 2016-07-18 23:27:59
        9CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

        CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

        Add to Reading List

        Source URL: www.tifr.res.in

        Language: English - Date: 2011-12-14 05:57:20
        10An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

        An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

        Add to Reading List

        Source URL: debut.cis.nctu.edu.tw

        Language: English - Date: 2013-07-12 03:09:44