Steganography

Results: 318



#Item
31Internet privacy / Content-control software / Internet security / Internet censorship / Computer network security / Telex / Censorship / Tor / Steganography / Roman censor / Deep packet inspection / Flash proxy

Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-07-07 21:36:37
32

Identity-Based Steganography and Its Applications to Censorship Resistance Tim Ruffing1 , Jonas Schneider1 , and Aniket Kate2 1 2

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2013-06-10 12:18:23
    33

    Broadcast Steganography Nelly Fazio1,3 1 The City College of CUNY

    Add to Reading List

    Source URL: www.cs.stevens.edu

    Language: English - Date: 2013-11-01 09:54:43
      34

      Introduction Network Steganography MSc Project Conclusion Steganographic Communication Using TCP Inter

      Add to Reading List

      Source URL: www.tuebix.org

      Language: English - Date: 2016-02-19 04:05:51
        35

        Toward a theory of Steganography Nicholas J. Hopper CMU-CSJuly 2004

        Add to Reading List

        Source URL: reports-archive.adm.cs.cmu.edu

        Language: English - Date: 2004-08-12 18:12:57
          36

          Adaptive Steganography and Steganalysis with Fixed-Size Embedding Benjamin Johnsonae , Pascal Sch¨ottleb , Aron Laszkac , Jens Grossklagsd , and Rainer B¨ohmeb a Cylab, Carnegie Mellon University, USA

          Add to Reading List

          Source URL: aronlaszka.com

          Language: English - Date: 2015-04-29 16:35:46
            37Software / Microsoft / Videotelephony / Philosophy of artificial intelligence / Steganography / Chinese room / Skype / Code / Computer / Hackers: Heroes of the Computer Revolution / Philosophical zombie / Outlook.com

            ISSNPrint) ISSNOnline) Computer Science for Fun Clean up your

            Add to Reading List

            Source URL: www.cs4fn.org

            Language: English - Date: 2013-11-16 13:54:49
            38

            Eliminating Steganography in Internet Traffic with Active Wardens Gina Fisk†§ , Mike Fisk† , Christos Papadopoulos§, and Josh Neil†§ † §

            Add to Reading List

            Source URL: www.gray-world.net

            Language: English - Date: 2010-06-12 03:14:41
              39

              An Analysis of Empirical PMF Based Tests For Least Significant Bit Image Steganography Stark Draper, Prakash Ishwar, David Molnar, Vinod Prabhakaran, Kannan Ramchandran, Daniel Schonberg, and David Wagner? University of

              Add to Reading List

              Source URL: www.dmolnar.com

              Language: English - Date: 2009-08-16 02:42:19
                40

                Data Hiding Release Notes WetStone Technologies | April 2015  This release covers maintenance to datasets to reduce false positives.  New threats have been added to the Encryption and Steganography categories.

                Add to Reading List

                Source URL: wetstonetech.com

                - Date: 2015-04-17 14:46:57
                  UPDATE