IBM Systems Journal
A note on the confinement problem
Communications of the ACM
Proceedings of the First International Workshop on Information Hiding
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Steganography in Compressed Video Stream
ICICIC '06 Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume 1
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
IEEE Spectrum
Editor's note: stuxnet, the real start of cyber warfare?
IEEE Network: The Magazine of Global Internetworking
Stegobot: a covert social network botnet
IH'11 Proceedings of the 13th international conference on Information hiding
Hiding information in a Stream Control Transmission Protocol
Computer Communications
An asynchronous covert channel using spam
Computers & Mathematics with Applications
StegTorrent: A Steganographic Method for the P2P File Sharing Service
SPW '13 Proceedings of the 2013 IEEE Security and Privacy Workshops
Hi-index | 48.22 |
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.