<--- Back to Details
First PageDocument Content
Computer networking / Covert channel / Steganography / Channel / Keystroke logging / Timing attack / Transmission Control Protocol / Jitter / Overt channel / Computing / Espionage / Electronics
Date: 2006-08-07 14:09:37
Computer networking
Covert channel
Steganography
Channel
Keystroke logging
Timing attack
Transmission Control Protocol
Jitter
Overt channel
Computing
Espionage
Electronics

Add to Reading List

Source URL: crypto.com

Download Document from Source Website

File Size: 484,00 KB

Share Document on Facebook

Similar Documents

Outguess How to hide your secret information in plain sight Stego: Outguess Hide your private data in ordinary files with this most excellent steganography program and the curiously named Nate Drake.

DocID: 1tKBg - View Document

WWWTrack: Data Mining Session: Mining in Social Networks Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography

DocID: 1t44X - View Document

Steganography Jenny Hong Stephen Boyd EE103

DocID: 1stpZ - View Document

Image compression / Computing / Graphics file formats / Computer file formats / Engineering / Digital television / Noise / Learning / JPEG / Peak signal-to-noise ratio / Mask / Steganography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1rsYl - View Document

Mathematics / Algebra / Topology / Algebraic geometry / Digital television / Image compression / Noise / Peak signal-to-noise ratio / Steganography / Embedding / Ample line bundle

High capacity image steganographic model Y.K.Lee and L.H.Chen Abstract: Steganography is an ancient art o r conveying messages in a secret way thal only Ihe receiver knows the existence of a message. So a fundamental req

DocID: 1rr08 - View Document