Steganographic file system

Results: 12



#Item
1A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
2The Square Root Law of Steganographic Capacity Andrew D. Ker Tomáš Pevný  Oxford University Computing Laboratory

The Square Root Law of Steganographic Capacity Andrew D. Ker Tomáš Pevný Oxford University Computing Laboratory

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2008-06-09 14:47:20
3Bibliography  [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
4Steganography The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no iss

Steganography The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no iss

Add to Reading List

Source URL: www.mttgroup.ch

Language: English - Date: 2015-01-14 11:58:03
5Bibliography  [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–[removed]M Abadi, RM Needham,

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–[removed]M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
6Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center

Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2013-09-11 13:26:16
7

PDF Document

Add to Reading List

Source URL: www.l3s.de

Language: English - Date: 2005-08-10 18:07:12
8

PDF Document

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2002-03-14 17:08:51
9

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 09:55:03
10

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2000-03-01 17:25:38