Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
An evaluation of the history, demand...
~
Utica College.
An evaluation of the history, demand, and current methods for digital steganography.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
An evaluation of the history, demand, and current methods for digital steganography./
Author:
Storms, Justin E.
Description:
1 online resource (52 pages)
Notes:
Source: Masters Abstracts International, Volume: 56-02.
Subject:
Computer science. -
Online resource:
click for full text (PQDT)
ISBN:
9781369431735
An evaluation of the history, demand, and current methods for digital steganography.
Storms, Justin E.
An evaluation of the history, demand, and current methods for digital steganography.
- 1 online resource (52 pages)
Source: Masters Abstracts International, Volume: 56-02.
Thesis (M.S.)--Utica College, 2016.
Includes bibliographical references
The purpose of this research paper was to assess the status of the fields of digital steganography and steganalysis. Steganography has been used to covertly transmit a variety of sensitive information for a variety of purposes since long before the digital age. The adaptation of the field of data hiding to information systems has led to a virtual reinvention of the discipline. Despite decades of research, digital steganography remains a daunting challenge to law enforcement, government agencies, and other organizations. As a result, there is a focused demand from those sources for research and development in the field of steganalysis. This research paper first explored the history, demand, and methods of data hiding in order to facilitate an understanding of the concept of steganography. Second, current trends and research in steganography were explored. Third, the trajectories of current lines of research were analyzed so that future directions could be projected. These future directions are likely to revolve around advancements in network steganography and vulnerability exploitation of the integration of cryptography in modern data hiding tools.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369431735Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
An evaluation of the history, demand, and current methods for digital steganography.
LDR
:02359ntm a2200337K 4500
001
912798
005
20180608130007.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369431735
035
$a
(MiAaPQ)AAI10250140
035
$a
(MiAaPQ)utica:10844
035
$a
AAI10250140
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Storms, Justin E.
$3
1185329
245
1 3
$a
An evaluation of the history, demand, and current methods for digital steganography.
264
0
$c
2016
300
$a
1 online resource (52 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-02.
500
$a
Includes supplementary digital materials.
500
$a
Adviser: Albert Orbinati.
502
$a
Thesis (M.S.)--Utica College, 2016.
504
$a
Includes bibliographical references
520
$a
The purpose of this research paper was to assess the status of the fields of digital steganography and steganalysis. Steganography has been used to covertly transmit a variety of sensitive information for a variety of purposes since long before the digital age. The adaptation of the field of data hiding to information systems has led to a virtual reinvention of the discipline. Despite decades of research, digital steganography remains a daunting challenge to law enforcement, government agencies, and other organizations. As a result, there is a focused demand from those sources for research and development in the field of steganalysis. This research paper first explored the history, demand, and methods of data hiding in order to facilitate an understanding of the concept of steganography. Second, current trends and research in steganography were explored. Third, the trajectories of current lines of research were analyzed so that future directions could be projected. These future directions are likely to revolve around advancements in network steganography and vulnerability exploitation of the integration of cryptography in modern data hiding tools.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10250140
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login