puzzlefiles.com
PuzzleFiles Encrytption Personal Encryptor
https://www.puzzlefiles.com/StegDocs.html
SHA 1 to 512 and HMAC. Image files to Base64. Is the art and science of hiding messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the hidden message. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphei meaning "writing". In the modern digital age steganography is c. Today it may now be illegal. To edit, remove and or decrypt certain metadata information.
xdrz.blogspot.com
XDrz: Working - Jiayu 10
http://xdrz.blogspot.com/2008/08/working-jiayu-10.html
Working - Jiayu 10. 12288; ① line 1-11. 12288; ② line 13-41. 12288; ③ line 766-786. 備註:有一些C的語法想了一陣子, 進度有點緩慢, 請見諒。 標籤: 94360725 陳佳玉. 訂閱: 張貼留言 (Atom). Open Source Code Search Engine. Discussion - Jiayus note. Meeting - Jiayus note. Defending Against Statistical Steganalysis - 心得與筆記. Working - Jiayu 10. Meeting - Jiayu 11.
xdrz.blogspot.com
XDrz: 五月 2008
http://xdrz.blogspot.com/2008_05_01_archive.html
Meeting - Jiayu 10. 時間:2008.05.27. 12288; ①學術論文的研究動機:寫出該研究的重要性。 12288; ②測試程式產生obj檔。 12288; ③ 正確宣告extern以使用其他副程式的函數. 12288; ④ 使用obj檔(承②). 12288; ⑤variable scope。 12288; Global variable與Local variable的差異在於生命週期。 12288; 時間分三種:1.Compile Time 2.Link Time 3.Run Time. 12288; (名稱可能有誤). 12288; Global variable是在Compile Time就產生(這裡的產生就是系. 12288; 統給一塊記憶體),然後包進obj檔裡。 12288; Local variable:執行到該函數時才產生,即Run Time時產. 12288; 生,該函數執行完即消失。 工作:①世昭至圖書館找五篇論文的研究動機,再找五篇學長姐專研文. 標籤: 94360725 陳佳玉. Working - Jiayu 09.
tm.fidosoft.org
GEOCACHING |
http://tm.fidosoft.org/index.php/category/geocaching
Archive for the ‘GEOCACHING’ Category. Detecting and Extracting Steganographic Content. February 16th, 2009 in COMPUTE. To embed hidden text into JPEG images. This is not a new concept, people have been using some form of steganography for many, many years. If the method used to hide the data is known then it is just a matter of determining what the passphrase is. If you have the compute power and a good dictionary then finding the passphrase using brute force. Etc None of those tools would properly extr...
cryptomex.org
Sistemas Operativos
http://www.cryptomex.org/cripto.html
Applied Cryptography, Protocols, Algorithms and Source Code in C,. Ed John Wiley and Sons, 1996. Handbook of applied Cryptography, A. Menezes P van Oorsschot and Vanston,. CRC Press, 1996. Disponible en formato electronico en: ( http:/ www.cacr.math.uwaterloo.ca/hac. By Niels Ferguson, Bruce Schneier. Wiley Publishing Inc, 2003. Cryptography and Network Security, Principles and Practice,. Ed Prentice Hall, 3ra. edición, 2003. The Codebreakers; The Comprehensive History of Secret Communication. El cuento ...
niels.xtdnet.nl
Steganography
http://niels.xtdnet.nl/stego
Due to a new. Super DMCA), the legality of my research or these web pages is currently unclear. Felten provides additional information. About the resulting restrictions on technology and research. Potentially offending web content. Has been moved to the Netherlands. Please, support the EFF. If you are a reporter and have questions about the research, please have a look at the Steganography Press Information. Defending Against Statistical Steganalysis. Probabilistic Methods for Improving Information Hiding.
tm.fidosoft.org
HOME |
http://tm.fidosoft.org/index.php/category/home
Archive for the ‘HOME’ Category. January 24th, 2009 in HOME. Steganography examples with Outguess. January 15th, 2009 in HOME. Without getting into the history or politics of steganography I’ve set this page up as a (hopefully) light reading reference for those who are interested in the 10,000 foot view. There are plenty of elaborate sites out on the web with detailed examples and definitions of steganography, this is not one of them. In modern steganography messages are likely to be encrypted. In my cur...
xdrz.blogspot.com
XDrz: 一月 2008
http://xdrz.blogspot.com/2008_01_01_archive.html
8251;Date:2008.01.25. 8251;Place:S building @ MCU. 討論於Facebook介面上實作JPEG Information Hiding的可行性。 Note:本次討論,Base on 對於"Facebook可提供資源"仍不熟悉的狀況來模擬]. 12288;該介面可連線到一台主Server,主Server使用BCB程式處理,. 12288;關於圖片的處理,全部交由Server處理;. 12288;PHP僅處理資料(圖片、Message)傳遞。 8251;相關問題與討論,以下針對 方案一. 1圖片→管理者設定 (可以一開始就知道 容量大小,但圖片選擇性低). 12288; 使用者設定 (必須另外判定圖片可藏的資料量). 12288; 網路(網路的流量可以達到快速不delay嗎? 12288;目前facebook提供的空間不明,資源不明。 12288;且機器設置位置為一大考量,首先必須要找到一位置提供全天候電源服務;. 12288;由於在Information Hiding的過程中,圖片與訊息的傳遞,為一大考量. Meeting - Jiayu 03.
xdrz.blogspot.com
XDrz: 96學年度第一學期專研進度
http://xdrz.blogspot.com/2007/12/96.html
訂閱: 張貼留言 (Atom). Open Source Code Search Engine. Discussion - Jiayus note. Meeting - Jiayus note.