Steganography

Results: 318



#Item
271Searching for the Stego-Key a

Searching for the Stego-Key a

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-04-26 08:10:29
272Journal of Electronic Imaging 15(4), [removed]Oct–Dec[removed]Performance study of common image steganography and

Journal of Electronic Imaging 15(4), [removed]Oct–Dec[removed]Performance study of common image steganography and

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2010-03-22 14:15:00
273Microsoft Word - new paper2_180.doc

Microsoft Word - new paper2_180.doc

Add to Reading List

Source URL: www.ubicc.org

Language: English - Date: 2010-06-17 08:16:11
274Free for All  How Linux and the

Free for All How Linux and the

Add to Reading List

Source URL: www.wayner.org

Language: English - Date: 2009-07-23 08:08:49
275International Journal of Computer Applications (0975 – 8887) Volume 18– No.2, March 2011

International Journal of Computer Applications (0975 – 8887) Volume 18– No.2, March 2011

Add to Reading List

Source URL: www.ijcaonline.org

Language: English - Date: 2011-03-30 11:01:02
276NEW ASPECTS of SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY and ARTIFICIAL VISION  Secure Steganography for Audio Signals

NEW ASPECTS of SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY and ARTIFICIAL VISION Secure Steganography for Audio Signals

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2010-09-09 05:34:58
277Linguistic Steganography: Information Hiding in Text Stephen Clark and Ching-Yun (Frannie) Chang University of Cambridge Computer Laboratory

Linguistic Steganography: Information Hiding in Text Stephen Clark and Ching-Yun (Frannie) Chang University of Cambridge Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-05-23 09:01:19
278HICCUPS: Hidden Communication System for Corrupted Networks KRZYSZTOF SZCZYPIORSKI

HICCUPS: Hidden Communication System for Corrupted Networks KRZYSZTOF SZCZYPIORSKI

Add to Reading List

Source URL: krzysiek.tele.pw.edu.pl

Language: English - Date: 2003-10-17 10:59:28
2791  Embedding Covert Channels into TCP/IP

1 Embedding Covert Channels into TCP/IP

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-07-29 14:41:40
280A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02