<--- Back to Details
First PageDocument Content
Steganographic file system / System software / Data management / Filesystem-level encryption / StegFS / File system / Steganalysis / Steganography / Disk file systems / Espionage
Date: 2005-08-10 18:07:12
Steganographic file system
System software
Data management
Filesystem-level encryption
StegFS
File system
Steganalysis
Steganography
Disk file systems
Espionage

Add to Reading List

Source URL: www.l3s.de

Download Document from Source Website

File Size: 739,54 KB

Share Document on Facebook

Similar Documents

Cryptography / Steganography / Mathematics / Steganalysis / Digital watermarking / JPEG / Error detection and correction / Subliminal channel / Embedding / Bit error rate / Steganography tools / Steganographic file system

A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

DocID: 1qAcU - View Document

Steganalysis / JPEG / Image noise / Jessica Fridrich / Steganographic file system / Cryptography / Steganography / Espionage

The Square Root Law of Steganographic Capacity Andrew D. Ker Tomáš Pevný Oxford University Computing Laboratory

DocID: 1age0 - View Document

Steganographic file system / Serpent / Computer security / Tamper resistance / Ambient intelligence / Ross J. Anderson / Cryptography / Security / Lecture Notes in Computer Science

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

DocID: 19qeD - View Document

Security / Information security / Plaintext / Computer file / Computer virus / Steganographic file system / Steganalysis / Cryptography / Espionage / Steganography

Steganography The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no iss

DocID: 12Pbx - View Document

Steganographic file system / Serpent / Computer security / Tamper resistance / Ambient intelligence / Ross J. Anderson / Cryptography / Security / Lecture Notes in Computer Science

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–[removed]M Abadi, RM Needham,

DocID: 8RxH - View Document