Steganography may increase learning everywhere
Journal of Computing Sciences in Colleges
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
Detecting steganography on a large scale
Crossroads
International Journal of Communication Networks and Distributed Systems
Hamiltonian graph approach to steganography
International Journal of Electronic Security and Digital Forensics
The design of a steganographic system based on the GOP structure in the video standard MPEG-4
ICCC'11 Proceedings of the 2011 international conference on Computers and computing
A steganographic method for digital images robust to RS steganalysis
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
A new steganography scheme in the domain of side-match vector quantization
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Hiding Message in Map Along Pre-Hamiltonian Path
International Journal of Information Security and Privacy
Steganography content detection by means of feedforward neural network
International Journal of Innovative Computing and Applications
Hi-index | 0.00 |
From the Publisher:These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted messages in ordinary-looking data files, making the very existence of the messages practically undetectable. Although steganography is not a new field and has played a critical part in secret communication throughout history, few people understand exactly how it works today. This detailed, practical guide changes that -- whether your goal is to add an extra level of security to business or government communications or to detect and counter steganography when it's used by criminals or terrorists.