-
2
-
-
50149091511
-
-
Artech House, Norwood, MA
-
Johnson, N. F. and Katzenbeisser, S. (1999) A Survey of Steganographic Techniques. Information Hiding, pp. 43-78. Artech House, Norwood, MA
-
(1999)
A Survey of Steganographic Techniques. Information Hiding
, pp. 43-78
-
-
Johnson, N.F.1
Katzenbeisser, S.2
-
3
-
-
33847675252
-
An Overview of Steganography for the Computer Forensics Examiner
-
Technical Report
-
Kessler, G. C. (2004) An Overview of Steganography for the Computer Forensics Examiner. Forensic Science Communications. Technical Report, 6:3
-
(2004)
Forensic Science Communications
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
4
-
-
28944432343
-
Is Image Steganography Natural?"
-
Martin, A., Sapiro, G. and Seroussi, G. (2005) Is Image Steganography Natural?". IEEE Transactions on Image Processing, 14:12, pp. 2040-2050.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2040-2050
-
-
Martin, A.1
Sapiro, G.2
Seroussi, G.3
-
7
-
-
0032680807
-
Information Hiding - A Survey
-
Petitcolas, F. A. P. (1999) Information Hiding-A Survey. Proceedings of the IEEE, 87:7, pp. 1062-1078.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
-
10
-
-
84957873374
-
The Steganographic File System
-
Anderson, R. J., Needham, R. and Shamir, A. (1998) The Steganographic File System. Lecture Notes in Computer Science, 1525, pp. 73-82.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 73-82
-
-
Anderson, R.J.1
Needham, R.2
Shamir, A.3
-
12
-
-
57849121143
-
Public Steganography Methodology
-
Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County
-
Desoky, A. and Younis, M. PSM: Public Steganography Methodology. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County.
-
-
-
Desoky, A.1
Younis, M.P.S.M.2
-
14
-
-
84950895792
-
Mimic Functions
-
Wayner, P. (1992) Mimic Functions. Cryptologia, 16:3, pp. 193-214.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
16
-
-
0005013984
-
Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
-
Chapman, M. and Davida, G. (1997) Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. Lecture Notes in Computer Science, 1334, pp. 335-345.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 335-345
-
-
Chapman, M.1
Davida, G.2
-
17
-
-
1542698939
-
Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
-
Master's thesis, University of Wisconsin, Milwaukee
-
Chapman, M. (1997) Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text, Master's thesis, University of Wisconsin, Milwaukee
-
(1997)
-
-
Chapman, M.1
-
18
-
-
84947255170
-
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
-
Chapman, M. et al. (2001) A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. Lecture Notes in Computer Science, 2200, pp. 156-165.
-
(2001)
Lecture Notes in Computer Science
, vol.2200
, pp. 156-165
-
-
Chapman, M.1
-
19
-
-
84944053897
-
Plausible Deniability Using Automated Linguistic Steganography
-
Chapman, M. and Davida, G. I. (2002) Plausible Deniability Using Automated Linguistic Steganography. Lecture Notes in Computer Science, 2437, pp. 276-287.
-
(2002)
Lecture Notes in Computer Science
, vol.2437
, pp. 276-287
-
-
Chapman, M.1
Davida, G.I.2
-
23
-
-
70349135638
-
Information Hiding Through Errors: A Confusing Approach
-
Topkara, M., Topkara, U. and Atallah, M. J. Information Hiding Through Errors: A Confusing Approach. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
|