Search Results - "steganography"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 124
- Security measures 91
- Data encryption (Computer science) 81
- Computer networks 71
- Cryptography 51
- Data protection 50
- Artificial intelligence 42
- Multimedia systems 32
- Computer science 30
- Digital watermarking 28
- Image processing 27
- Information technology 26
- Computational intelligence 17
- Computer crimes 16
- Computer vision 16
- Digital techniques 15
- Data processing 13
- Machine learning 13
- Internet 12
- Investigation 12
- Signal processing 11
- Big data 10
- Computers 10
- Examinations 10
- Internet of things 10
- Soft computing 9
- Watermarks 9
- Data mining 8
- Database management 7
- Digital forensic science 7
-
21
Optimization models in steganography using metaheuristics
Published 2020Full Text (via Springer)
Electronic eBook -
22
-
23
-
24
Reversible steganography and authentication via transform encoding /
Published 2020Table of Contents: “…Encoding for Reversible Steganography and Authentication -- Reversible Encoding …”
Full Text (via Springer)
eBook -
25
-
26
-
27
Security, steganography, and watermarking of multimedia contents IX 29 January-1 February, 2007, San Jose, California, USA /
Published 2007Table of Contents: “…embedding impact in steganography / Jessica Fridrich and Tomas Filler -- …”
Full Text (via SPIE Digital Library)
Electronic eBook -
28
-
29
Information hiding techniques for steganography and digital watermarking /
Published 2000Table of Contents: “…Secret writing and steganography.…”
Full Text (via EBSCO)
eBook -
30
Optical encryption and decryption /
Published 2019Table of Contents: “…Data security: 2.1. Steganography; 2.2. Watermarking; 2.3. Cryptography -- …”
Full Text (via SPIE Digital Library)
eBook -
31
Security, forensics, steganography, and watermarking of multimedia contents X 28-30 January 2008, San Jose, California, USA /
Published 2008Table of Contents: “…Jessica Fridrich -- WLAN steganography revisited / Christian Kraetzer, Jana Dittmann, …”
Full Text (via SPIE Digital Library)
Electronic eBook -
32
-
33
-
34
-
35
-
36
Multimedia security : watermarking, steganography, and forensics /
Published 2013Table of Contents: “…Watermarking -- pt. 3. Steganography -- pt. 4. Forensics.…”
Full Text (via O'Reilly/Safari)
eBook -
37
Disappearing cryptography information hiding : steganography & watermarking /
Published 2002Full Text (via ScienceDirect)
Electronic eBook -
38
Disappearing cryptography information hiding : steganography & watermarking /
Published 2009Full Text (via ScienceDirect)
Electronic eBook -
39
Multimedia security watermarking, steganography, and forensics /
Published 2013Table of Contents: “…Watermarking -- pt. 3. Steganography -- pt. 4. Forensics.…”
Full Text (via Taylor & Francis)
Electronic eBook -
40
Multimedia security watermarking, steganography, and forensics /
Published 2013Table of Contents: “…Watermarking -- pt. 3. Steganography -- pt. 4. Forensics.…”
Full Text (via Taylor & Francis)
Electronic eBook