Cargando…

Investigator's guide to steganography

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved fro...

Descripción completa

Detalles Bibliográficos
Autor principal: Kipper, Gregory
Lenguaje:eng
Publicado: CRC Press 2003
Materias:
Acceso en línea:http://cds.cern.ch/record/2024782
_version_ 1780947161188401152
author Kipper, Gregory
author_facet Kipper, Gregory
author_sort Kipper, Gregory
collection CERN
description The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future
id cern-2024782
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2003
publisher CRC Press
record_format invenio
spelling cern-20247822021-04-21T20:11:23Zhttp://cds.cern.ch/record/2024782engKipper, GregoryInvestigator's guide to steganographyComputing and ComputersThe Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the futureCRC Pressoai:cds.cern.ch:20247822003
spellingShingle Computing and Computers
Kipper, Gregory
Investigator's guide to steganography
title Investigator's guide to steganography
title_full Investigator's guide to steganography
title_fullStr Investigator's guide to steganography
title_full_unstemmed Investigator's guide to steganography
title_short Investigator's guide to steganography
title_sort investigator's guide to steganography
topic Computing and Computers
url http://cds.cern.ch/record/2024782
work_keys_str_mv AT kippergregory investigatorsguidetosteganography