Also found in: Dictionary, Medical, Acronyms, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
  • noun

Synonyms for steganography

References in periodicals archive ?
With the content-adaptive scheme becomes the mainstream of JPEG steganography techniques, the corresponding steganalysis techniques also begin to attract more and more attentions.
StegBlender represents a new approach to steganography.
Steganography or the concept of data hiding was first mentioned in a work by Johannes Trithemus (14621516) titled "Steganographia".
There are stories of steganography used during the Roman Empire whereby a messenger's shaved scalp received a tattooed message.
Today excessive use of digital images on social networks and on other applications of digital communication provides the opportunity to use digital images in watermarking or in steganography as a cover for hiding secret messages.
Keywords: information security, video, steganography, trailing coefficients
Szczypiorski, "Trends in steganography," Communications of the ACM, vol.
In this research, we built a digital steganography system using Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) method.
In the show, Elliot uses a steganography tool called DeepSound that lets you hide any type of file within audio formats across flac, mp3, wav and wma.
While this basic premise is fairly common, we've recently seen a resurgence in the use of steganography among a new audience--malware authors.
While not technically steganography, the original image is now hidden by its doppelganger cover.
Data Encryption, Data Hiding and Steganography, DOS Attacks and Distributed DOS Attacks, along with Phishing Attacks & Open Redirection Attacks, Cross Site Scripting Attacks and Data Sniffing & ARP Poisoning will feature in the seminar.
His topics include the language of cryptography, components, hashing and message digests, cryptanalysis and code breaking, public key infrastructure, steganography, and quantum cryptography.
The exercises required entrants to submit answers and accompanying methodologies to solve puzzles, ranging from image geo tagging analysis and data obfuscation to password recovery, file encryption and advanced steganography.