Unit 8: Steganography 8.2 Additional Resources Additional Resources

mac2022-06-30  21

ADDITIONAL RESOURCES

LECTURE SLIDES

Article

Hide and Seek: An Introduction to Steganography, Niels Provos and Peter Honeyman, IEEE Security & Privacy ( Volume: 99, Issue: 3, May-June 2003)

Downloads
Invisible Secrets product page, East-TecSpam Mimic, a spam "grammar" for a mimic engine, spammimic.comOpenStego, the free steganography solution, Samir Vaidya

转载于:https://www.cnblogs.com/sec875/articles/10040379.html

相关资源:Image Steganography and Steganalysis
最新回复(0)