Cargando…
Investigator's guide to steganography
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved fro...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
CRC Press
2003
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2024782 |
_version_ | 1780947161188401152 |
---|---|
author | Kipper, Gregory |
author_facet | Kipper, Gregory |
author_sort | Kipper, Gregory |
collection | CERN |
description | The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future |
id | cern-2024782 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2003 |
publisher | CRC Press |
record_format | invenio |
spelling | cern-20247822021-04-21T20:11:23Zhttp://cds.cern.ch/record/2024782engKipper, GregoryInvestigator's guide to steganographyComputing and ComputersThe Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the futureCRC Pressoai:cds.cern.ch:20247822003 |
spellingShingle | Computing and Computers Kipper, Gregory Investigator's guide to steganography |
title | Investigator's guide to steganography |
title_full | Investigator's guide to steganography |
title_fullStr | Investigator's guide to steganography |
title_full_unstemmed | Investigator's guide to steganography |
title_short | Investigator's guide to steganography |
title_sort | investigator's guide to steganography |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2024782 |
work_keys_str_mv | AT kippergregory investigatorsguidetosteganography |