Search Results - "steganography"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Audio steganography by Muhamad Fazree Sharip

    Published 2013
    Thesis Book
  2. 2

    Digital watermarking and steganography by Cox, Ingemar J.

    Published 2008
    Book
  3. 3

    Information hiding techniques for steganography and digital watermarking by lh

    Book
  4. 4

    Dissappearing cryptography information hiding steganography & watermarking by Wayner, Peter 1964-

    Published 2009
    Book
  5. 5

    Multimedia security watermarking, steganography, and forensics

    Published 2012
    Table of Contents: “…Watermarking -- pt. 3. Steganography -- pt. 4. Forensics.…”
    Book
  6. 6

    Hiding minutiae data using steganography for fingerprint recognition systems by Salehuddin Abdul Kadir

    Published 2005
    Thesis Book
  7. 7

    Cryptography infosec pro guide by Oriyano, Sean-Philip

    Published 2013
    Table of Contents: “…The language of cryptography -- History of cryptography -- Components of cryptography -- Algorithms and ciphers -- Hashing and message digests -- Cryptanalysis and code breaking -- Public key infrastructure -- Steganography -- Applied cryptography -- Quantum cryptography -- The future of cryptography.…”
    Book
  8. 8

    Applied video processing in surveillance and monitoring systems

    Published 2017
    Table of Contents: “…Srinivasa Rao -- Image registration techniques and frameworks: a review / Sayan Chakraborty [and 4 others] -- An overview of steganography: "hiding in plain sight" / Al Hussien Seddik Saad, Abdelmgeid Amin Ali -- Design of reconfigurable architectures for steganography system / Sathish Shet [and 3 others] -- Encoding human motion for automated activity recognition in surveillance applications / Ammar Ladjailia [and 3 others] -- Object-based surveillance video synopsis using genetic algorithm / Shefali Gandhi, Tushar V. …”
    Book
  9. 9

    Cyberspace and cybersecurity by Kostopoulos, George K.

    Published 2018
    Book
  10. 10

    Algorithm in applications

    Published 2010
    Table of Contents: “…Roy and N. Sarma -- Network steganography : a brief survey / Anand S. Nair, Arijit Sur and Sukumar Nandi -- A review of classical algorithms for peer-to-peer systems / Guruprasad Khataniar and Diganta Goswami -- A polynomial-time reduction of the shortest s-directed spanning tree problem to linear programming / M. …”
    Conference Proceeding Book
  11. 11

    Computer forensics investigating data and image files

    Published 2017
    Book
  12. 12

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…ch. 1 Introduction -- Overview -- Professional utility of information security knowledge -- Brief history -- Definition of information security -- Summary -- Example case -- Wikileaks, Cablegate, and free reign over classified networks -- Chapter review questions -- Example case questions -- Hands-on activity -- Software Inspector, Steganography -- Critical thinking exercise: identifying CIA area(s) affected by sample real-life hacking incidents -- Design case -- ch. 2 System Administration (Part 1) -- Overview -- Introduction -- What is system administration? …”
    Book