Search Results - "steganography"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 4
- Security measures 4
- Computer networks 3
- Computer crimes 2
- Data protection 2
- Computer algorithms 1
- Criminal investigation 1
- Cryptography 1
- Crytography 1
- Cyberspace 1
- Data encryption (Computer science) 1
- Data structures (Computer science) 1
- Digital watermarking 1
- Electronic evidence 1
- Examinations 1
- Hackers 1
- Image processing 1
- Internet 1
- Investigation 1
- Multimedia communicatios 1
- Prevention 1
- Video surveillance 1
- Watermarks 1
- digital techniques 1
-
1
-
2
-
3
-
4
-
5
Multimedia security watermarking, steganography, and forensics
Published 2012Table of Contents: “…Watermarking -- pt. 3. Steganography -- pt. 4. Forensics.…”
Book -
6
Hiding minutiae data using steganography for fingerprint recognition systems
Published 2005Thesis Book -
7
Cryptography infosec pro guide
Published 2013Table of Contents: “…The language of cryptography -- History of cryptography -- Components of cryptography -- Algorithms and ciphers -- Hashing and message digests -- Cryptanalysis and code breaking -- Public key infrastructure -- Steganography -- Applied cryptography -- Quantum cryptography -- The future of cryptography.…”
Book -
8
Applied video processing in surveillance and monitoring systems
Published 2017Table of Contents: “…Srinivasa Rao -- Image registration techniques and frameworks: a review / Sayan Chakraborty [and 4 others] -- An overview of steganography: "hiding in plain sight" / Al Hussien Seddik Saad, Abdelmgeid Amin Ali -- Design of reconfigurable architectures for steganography system / Sathish Shet [and 3 others] -- Encoding human motion for automated activity recognition in surveillance applications / Ammar Ladjailia [and 3 others] -- Object-based surveillance video synopsis using genetic algorithm / Shefali Gandhi, Tushar V. …”
Book -
9
-
10
Algorithm in applications
Published 2010Table of Contents: “…Roy and N. Sarma -- Network steganography : a brief survey / Anand S. Nair, Arijit Sur and Sukumar Nandi -- A review of classical algorithms for peer-to-peer systems / Guruprasad Khataniar and Diganta Goswami -- A polynomial-time reduction of the shortest s-directed spanning tree problem to linear programming / M. …”
Conference Proceeding Book -
11
-
12
Information security and IT risk management
Published 2014Table of Contents: “…ch. 1 Introduction -- Overview -- Professional utility of information security knowledge -- Brief history -- Definition of information security -- Summary -- Example case -- Wikileaks, Cablegate, and free reign over classified networks -- Chapter review questions -- Example case questions -- Hands-on activity -- Software Inspector, Steganography -- Critical thinking exercise: identifying CIA area(s) affected by sample real-life hacking incidents -- Design case -- ch. 2 System Administration (Part 1) -- Overview -- Introduction -- What is system administration? …”
Book


