語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An evaluation of the history, demand...
~
Utica College.
An evaluation of the history, demand, and current methods for digital steganography.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
An evaluation of the history, demand, and current methods for digital steganography./
作者:
Storms, Justin E.
面頁冊數:
1 online resource (52 pages)
附註:
Source: Masters Abstracts International, Volume: 56-02.
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369431735
An evaluation of the history, demand, and current methods for digital steganography.
Storms, Justin E.
An evaluation of the history, demand, and current methods for digital steganography.
- 1 online resource (52 pages)
Source: Masters Abstracts International, Volume: 56-02.
Thesis (M.S.)--Utica College, 2016.
Includes bibliographical references
The purpose of this research paper was to assess the status of the fields of digital steganography and steganalysis. Steganography has been used to covertly transmit a variety of sensitive information for a variety of purposes since long before the digital age. The adaptation of the field of data hiding to information systems has led to a virtual reinvention of the discipline. Despite decades of research, digital steganography remains a daunting challenge to law enforcement, government agencies, and other organizations. As a result, there is a focused demand from those sources for research and development in the field of steganalysis. This research paper first explored the history, demand, and methods of data hiding in order to facilitate an understanding of the concept of steganography. Second, current trends and research in steganography were explored. Third, the trajectories of current lines of research were analyzed so that future directions could be projected. These future directions are likely to revolve around advancements in network steganography and vulnerability exploitation of the integration of cryptography in modern data hiding tools.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369431735Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
An evaluation of the history, demand, and current methods for digital steganography.
LDR
:02359ntm a2200337K 4500
001
912798
005
20180608130007.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369431735
035
$a
(MiAaPQ)AAI10250140
035
$a
(MiAaPQ)utica:10844
035
$a
AAI10250140
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Storms, Justin E.
$3
1185329
245
1 3
$a
An evaluation of the history, demand, and current methods for digital steganography.
264
0
$c
2016
300
$a
1 online resource (52 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-02.
500
$a
Includes supplementary digital materials.
500
$a
Adviser: Albert Orbinati.
502
$a
Thesis (M.S.)--Utica College, 2016.
504
$a
Includes bibliographical references
520
$a
The purpose of this research paper was to assess the status of the fields of digital steganography and steganalysis. Steganography has been used to covertly transmit a variety of sensitive information for a variety of purposes since long before the digital age. The adaptation of the field of data hiding to information systems has led to a virtual reinvention of the discipline. Despite decades of research, digital steganography remains a daunting challenge to law enforcement, government agencies, and other organizations. As a result, there is a focused demand from those sources for research and development in the field of steganalysis. This research paper first explored the history, demand, and methods of data hiding in order to facilitate an understanding of the concept of steganography. Second, current trends and research in steganography were explored. Third, the trajectories of current lines of research were analyzed so that future directions could be projected. These future directions are likely to revolve around advancements in network steganography and vulnerability exploitation of the integration of cryptography in modern data hiding tools.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10250140
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入