Suggested Topics within your search.
Suggested Topics within your search.
Computer security
4
Data encryption (Computer science)
3
Digital video
2
Digital watermarking
2
Image files
2
Security measures
2
Apply steganography
1
COMPUTER SECURITY
1
COMPUTERS / Security / Cryptography
1
Chaotic behavior in systems
1
Computer fraud
1
Create forensic system
1
Data protection
1
Daubert standard on the workstation domain
1
Dynamics
1
Hacking
1
Intellectual property
1
Knowledge,Information Hiding steganography,Public key crypyography
1
MATHEMATICS / Advanced
1
MATHEMATICS / Differential Equations
1
Multimedia systems
1
Perform a byte-level computer audit
1
STEGANOGRAPHY
1
Social engineering
1
Using bootable utilities
1
image processing- digital techniques
1
-
1
-
2by Fridrich, JessicaSubjects: “...Steganography - Digital image formats...”
Published 2010
Printed Book -
3
-
4
-
5
-
6by Kumar, MahendraSubjects: “...JPEG -Joint Picture Expert Group - Steganography...”
Published 2011
Printed Book -
7Printed Book
-
8
-
9
-
10
-
11
-
12by Cheddad, AbbasSubjects: “...Steganography - digital image formats...”
Published 2009
Printed Book -
13by patel Dhiren R.Subjects: “...Knowledge,Information Hiding steganography,Public key crypyography...”
Published 2008
Printed Book -
14Published 2013Subjects: “...Apply steganography...”
Printed Book -
15Published 2006Table of Contents: “...-fiat-shamir scheme 3. Neural vs genetic in steganography to indirectly hide sensitive data 4. Rule...”
Printed Book -
16
-
17by Patterson, WayneTable of Contents: “... -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses...”
Published 2019
Printed Book -
18
-
19
-
20Printed Book