Proceedings of the 2006 ACM symposium on Applied computing
Fast communication: Steganography and error-correcting codes
Signal Processing
Steganography obliterator: an attack on the least significant bits
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Visual detection of LSB-encoded natural image steganography
ACM Transactions on Applied Perception (TAP)
Parallel white noise generation on a GPU via cryptographic hash
Proceedings of the 2008 symposium on Interactive 3D graphics and games
Web services for digital rights management and copyright protection in digital media
Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts
A Supraliminal Channel in a Videoconferencing Application
Information Hiding
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Watermarking of audio signals through changing the phase of their maskers
CSECS'08 Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing
Applying robust multibit watermarks to digital images
Journal of Computational and Applied Mathematics
Detecting steganography on a large scale
Crossroads
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
A framework for synthetic stego
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
A supraliminal channel in a wireless phone application
Proceedings of the 11th ACM workshop on Multimedia and security
Hiding Information by Context-Based Synonym Substitution
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Digital watermarking in peer to peer networks
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Annales UMCS, Informatica
Multimedia Tools and Applications
Build a dictionary, learn a grammar, decipher stegoscripts, and discover genomic regulatory elements
RECOMB'05 Proceedings of the 2005 joint annual satellite conference on Systems biology and regulatory genomics
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Information hiding system stegoWaveK for improving capacity
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Information hiding method using CDMA on wave files
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
A study on visual attack to BPCS-Steganography and countermeasure
VLBV'05 Proceedings of the 9th international conference on Visual Content Processing and Representation
VAST'08 Proceedings of the 9th International conference on Virtual Reality, Archaeology and Cultural Heritage
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
From the Publisher:Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site contains implementations for hiding information in lists, sentences, and images. About the Author: Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.