Steganography

Results: 318



#Item
41

RopSteg: Program Steganography with Return Oriented Programming Kangjie Lu Siyang Xiong

Add to Reading List

Source URL: flyer.sis.smu.edu.sg

Language: English - Date: 2014-12-17 01:40:50
    42

    TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran , {lincoln, iam, vinod}@csl.sri.com SRI International

    Add to Reading List

    Source URL: censorbib.nymity.ch

    Language: English
      43Steganography / Electronics / Digital audio / Audio engineering / Cryptographic software / Steganalysis / Pulse-code modulation / Data compression / Speech coding / Cryptography / Espionage / Audio codecs

      An improved adaptive gain equalizer for noise reduction with low speech distortion

      Add to Reading List

      Source URL: asmp.eurasipjournals.com

      Language: English
      44

      Microsoft Word - new pixel sorting method for palette based steganography a…

      Add to Reading List

      Source URL: ticsp.cs.tut.fi

      - Date: 2008-04-01 15:04:15
        45

        2013 IEEE Security and Privacy Workshops Steganography in OFDM Symbols of Fast IEEE 802.11n Networks Szymon Grabski, Krzysztof Szczypiorski Institute of Telecommunications

        Add to Reading List

        Source URL: www.ieee-security.org

        - Date: 2013-05-05 16:05:04
          46

          An Information-Theoretic Model for Steganography∗ Christian Cachin† March 3, 2004 Abstract An information-theoretic model for steganography with a passive adversary is proposed.

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2004-03-04 03:32:53
            47

            Digital Steganography∗ Christian Cachin IBM Research Zurich Research Laboratory CH-8803 R¨uschlikon, Switzerland

            Add to Reading List

            Source URL: www.zurich.ibm.com

            Language: English - Date: 2005-02-17 07:31:15
              48

              2014 IEEE Security and Privacy Workshops Steganography in Long Term Evolution Systems Iwona Grabska, Krzysztof Szczypiorski Institute of Telecommunications

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2014-04-30 03:11:30
                49

                Steganography The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no iss

                Add to Reading List

                Source URL: mttgroup.ch

                Language: English - Date: 2015-01-14 11:58:03
                  50

                  Steganography with Imperfect Samplers Anna Lysyanskaya Brown University Maria Meyerovich

                  Add to Reading List

                  Source URL: cs.brown.edu

                  Language: English - Date: 2006-09-12 19:27:44
                    UPDATE