Steganography

Results: 318



#Item
1

Outguess How to hide your secret information in plain sight Stego: Outguess Hide your private data in ordinary files with this most excellent steganography program and the curiously named Nate Drake.

Add to Reading List

Source URL: s3.amazonaws.com

- Date: 2017-04-11 07:54:13
    2

    WWWTrack: Data Mining Session: Mining in Social Networks Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography

    Add to Reading List

    Source URL: pdfs.semanticscholar.org

    - Date: 2015-07-28 21:05:41
      3

      Steganography Jenny Hong Stephen Boyd EE103

      Add to Reading List

      Source URL: stanford.edu

      - Date: 2015-12-03 12:07:01
        4Image compression / Computing / Graphics file formats / Computer file formats / Engineering / Digital television / Noise / Learning / JPEG / Peak signal-to-noise ratio / Mask / Steganography

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-02-05 03:43:20
        5Mathematics / Algebra / Topology / Algebraic geometry / Digital television / Image compression / Noise / Peak signal-to-noise ratio / Steganography / Embedding / Ample line bundle

        High capacity image steganographic model Y.K.Lee and L.H.Chen Abstract: Steganography is an ancient art o r conveying messages in a secret way thal only Ihe receiver knows the existence of a message. So a fundamental req

        Add to Reading List

        Source URL: debut.cis.nctu.edu.tw

        Language: English - Date: 2013-07-12 03:09:44
        6Software / Tetris / Gaming / Digital media / Random number generation / Steganography / Public-key cryptography / Puzzle video game / Easter egg / Random sequence / Transmission Control Protocol

        CrossMark_Color_Stacked_p

        Add to Reading List

        Source URL: debut.cis.nctu.edu.tw

        Language: English - Date: 2014-08-15 02:06:04
        7Steganography / Technology / Digital media / Internet / Learning

        Microsoft Word - Available Technologies - Sam Houston

        Add to Reading List

        Source URL: gato-docs.its.txstate.edu

        Language: English - Date: 2016-08-09 20:27:47
        8Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

        SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

        Add to Reading List

        Source URL: www.rsaconference.com

        Language: English - Date: 2016-07-18 23:27:59
        9Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

        CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

        Add to Reading List

        Source URL: www.tifr.res.in

        Language: English - Date: 2011-12-14 05:57:20
        10Watermarking / Cryptography / Access control / Digital watermarking / Watermark / Security / Steganography / Ingemar Cox / JPEG / Cinavia / Audio watermark

        An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

        Add to Reading List

        Source URL: debut.cis.nctu.edu.tw

        Language: English - Date: 2013-07-12 03:09:44
        UPDATE