| Views | Cover | Author | Title | Published | Format | Updated | Thank_to |
1664880 | 364 | | Peter Wayner | Disappearing Cryptography, Third Edition: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) | 2008-12-17 | pdf | 9/4/2021 1:59:07 PM | tvladb77 |
1911320 | 440 | | Various | Codes, Ciphers, Steganography & Secret Messages | 2019 | epub | 4/14/2021 11:59:05 AM | alex21s |
1888492 | 88 | | Chun-Shien Lu | Multimedia Security:: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property | 2004 | PDF | 2/4/2021 8:11:35 AM | risotor |
1859503 | 77 | | Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities (A | Advanced Digital Image Steganography Using LSB, PVD, and EMD | 2019 | PDF | 12/13/2020 5:54:48 AM | topron |
1799251 | 35 | | Udemy | Fast track to ML, Data Science and Steganography | 2020 | MP4 | 8/13/2020 11:14:33 PM | oblivion |
1763900 | 323 | | Jyotsna Kumar Mandal | Reversible Steganography and Authentication via Transform Encoding | 2020-08-18 | pdf | 6/2/2020 9:55:23 AM | maveriks |
1702571 | 197 | | Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham | Optimization Models in Steganography Using Metaheuristics | 2020-05-30 | pdf | 2/26/2020 8:02:57 PM | maveriks |
1598006 | 115 | | Abdelrahman Desoky | Noiseless Steganography: The Key to Covert Communications | 2012-02-16 | pdf | 8/29/2019 9:25:50 PM | topron |
1541370 | 80 | | Neil F. Johnson, Zoran Duric, Sushil Jajodia (auth.) | Information Hiding: Steganography and Watermarking-Attacks and Countermeasures | 2018 | PDF | 5/14/2019 1:18:26 PM | Gustavi |
1357381 | 259 | | Eric Cole | Hiding in Plain Sight: Steganography and the Art of Covert Communication | 2017 | PDF | 7/25/2018 6:07:58 PM | alex21s |
|