Steganography

Results: 318



#Item
261Steganography in computer graphics InSaNe^WaRl0rD *OgGiZ* 14th February 2006 Contents 1 Introduction

Steganography in computer graphics InSaNe^WaRl0rD *OgGiZ* 14th February 2006 Contents 1 Introduction

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:34:14
262M. 5.4 Digital rights management and watermarking expression ECP-2007-DILI[removed]EFG – The European Film Gateway

M. 5.4 Digital rights management and watermarking expression ECP-2007-DILI[removed]EFG – The European Film Gateway

Add to Reading List

Source URL: www.efgproject.eu

Language: English - Date: 2012-09-13 05:26:17
263Prof. Krzysztof Szczypiorski, Ph.D., D.Sc. Contact Information Warsaw University of Technology (WUT) Faculty of Electronics and Information Technology

Prof. Krzysztof Szczypiorski, Ph.D., D.Sc. Contact Information Warsaw University of Technology (WUT) Faculty of Electronics and Information Technology

Add to Reading List

Source URL: szczypiorski.com

Language: English - Date: 2014-07-03 19:48:54
264Partial Feature List Data Encapsulation  Data and command options are contained in message capsules during composition. The capsule is moved to the server where it is bound to a master capsule that contains instructio

Partial Feature List Data Encapsulation  Data and command options are contained in message capsules during composition. The capsule is moved to the server where it is bound to a master capsule that contains instructio

Add to Reading List

Source URL: www.comlets.com

Language: English - Date: 2013-07-18 17:10:16
265Security / Digital photography / Digital watermarking / Steganography / Audio watermark detection / Steganalysis / Watermark / Fingerprint / Microsoft Research / Watermarking / Cryptography / Espionage

Texte : Watermarking Document Images with Bounding Box Expansion Jack Brassil and Larry O’Gorman Information Hiding 1st International Workshop, June 1996

Add to Reading List

Source URL: mantis.free.fr

Language: English - Date: 2000-12-06 07:25:52
266Prof. Krzysztof Szczypiorski, Ph.D., D.Sc. Contact Information Warsaw University of Technology (WUT) Faculty of Electronics and Information Technology

Prof. Krzysztof Szczypiorski, Ph.D., D.Sc. Contact Information Warsaw University of Technology (WUT) Faculty of Electronics and Information Technology

Add to Reading List

Source URL: ksz.tele.pw.edu.pl

Language: English - Date: 2014-06-24 18:42:57
267Prof. Krzysztof Szczypiorski, Ph.D., D.Sc. Contact Information Warsaw University of Technology (WUT) Faculty of Electronics and Information Technology

Prof. Krzysztof Szczypiorski, Ph.D., D.Sc. Contact Information Warsaw University of Technology (WUT) Faculty of Electronics and Information Technology

Add to Reading List

Source URL: krzysiek.tele.pw.edu.pl

Language: English - Date: 2014-06-24 18:42:57
268Call for Papers and Special Sessions IH&MMSec 2014 The 2nd Information Hiding and Multimedia Security Workshop* http://www.ihmmsec.org/ June 11-13, 2014 Salzburg, Austria

Call for Papers and Special Sessions IH&MMSec 2014 The 2nd Information Hiding and Multimedia Security Workshop* http://www.ihmmsec.org/ June 11-13, 2014 Salzburg, Austria

Add to Reading List

Source URL: www.sigmm.org

Language: English - Date: 2013-11-25 12:59:53
269Steganography, Steganalysis, & Cryptanalysis Michael T. Raggo, CISSP Principal Security Consultant VeriSign

Steganography, Steganalysis, & Cryptanalysis Michael T. Raggo, CISSP Principal Security Consultant VeriSign

Add to Reading List

Source URL: www.spy-hunter.com

Language: English - Date: 2008-01-18 07:06:52
270Identifying and Cracking Steganography Programs Session 65 Michael T. Raggo, Sr. Security Consultant, VeriSign CISSP, IAM, CCSA, CCSE, CCSI, SCSA, MCP

Identifying and Cracking Steganography Programs Session 65 Michael T. Raggo, Sr. Security Consultant, VeriSign CISSP, IAM, CCSA, CCSE, CCSI, SCSA, MCP

Add to Reading List

Source URL: www.spy-hunter.com

Language: English - Date: 2008-01-18 07:06:51