Steganography

Results: 318



#Item
291SECURITY  THROUGH OBSCURITY

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
292Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and

Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and

Add to Reading List

Source URL: wwwiti.cs.uni-magdeburg.de

Language: English - Date: 2007-05-21 07:47:15
293Detecting Steganographic Content on the Internet Niels Provos Peter Honeyman Center for Information Technology Integration

Detecting Steganographic Content on the Internet Niels Provos Peter Honeyman Center for Information Technology Integration

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-01-07 13:42:24
294

PDF Document

Add to Reading List

Source URL: research.ijcaonline.org

Language: English - Date: 2011-11-05 09:18:42
295

PDF Document

Add to Reading List

Source URL: omen.cs.uni-magdeburg.de

Language: English - Date: 2007-11-16 07:33:36
296Microsoft Word - DWVL10_FINAL.doc

Microsoft Word - DWVL10_FINAL.doc

Add to Reading List

Source URL: omen.cs.uni-magdeburg.de

Language: English - Date: 2006-08-11 07:11:42
297new copyright notice.indesign

new copyright notice.indesign

Add to Reading List

Source URL: www.wayner.org

Language: English - Date: 2005-12-04 11:33:26
298

PDF Document

Add to Reading List

Source URL: www.uotechnology.edu.iq

Language: English - Date: 2010-01-27 11:52:08
299

PDF Document

Add to Reading List

Source URL: www.spy-hunter.com

Language: English - Date: 2008-01-18 07:06:53
300

PDF Document

Add to Reading List

Source URL: www.l3s.de

Language: English - Date: 2005-08-10 18:07:12