Academic literature on the topic 'Steganografie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Steganografie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Steganografie"
Röckle, Haio. "Schmeh, Klaus: Versteckte Botschaften (TELEPOLIS): Die faszinierende Geschichte der Steganografie." Datenschutz und Datensicherheit - DuD 33, no. 5 (2009): 326. http://dx.doi.org/10.1007/s11623-009-0095-2.
Full textStrasser, Gerhard F. "Review ofVersteckte Botschaften. Die faszinierende Geschichte der Steganografie(Hidden Messages. The Fascinating Story of Steganography)." Cryptologia 34, no. 4 (2010): 371–80. http://dx.doi.org/10.1080/01611194.2010.509160.
Full textStrasser, Gerhard F. "Review of Versteckte Botschaften. Die faszinierende Geschichte der Steganografie. 2., aktualisierte und erweiterte Auflage (Hidden Messages. The Fascinating Story of Steganography. 2nd, updated and expanded edition) by Klaus Schmeh." Cryptologia 42, no. 5 (2018): 467–75. http://dx.doi.org/10.1080/01611194.2018.1435207.
Full textJatmoko, Cahaya, L. Budi Handoko, Christy Atika Sari, and De Rosal Ignatius Moses Setiadi. "Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi." Dinamika Rekayasa 14, no. 1 (2018): 47. http://dx.doi.org/10.20884/1.dr.2018.14.1.200.
Full textYakti, Bayu Kumoro, and Ragiel Hadi Prayitno. "Perbandingan Dan Analisa Gambar Pada Steganografi Berdasarkan MSE Dan PSNR." ICIT Journal 6, no. 2 (2020): 138–52. http://dx.doi.org/10.33050/icit.v6i2.1105.
Full textSoleh, Oleh, Fifit Alfiah, and Budi Yusuf. "Perancangan Aplikasi Steganografi Dengan Teknik LSB dan AlgoritmaRC4 & Base64 Encoding." Technomedia Journal 3, no. 1 (2018): 1–15. http://dx.doi.org/10.33050/tmj.v3i1.493.
Full textUtomo, Didi Susilo Budi, Jems Jems, Hari Purwadi, and Rihartanto Rihartanto. "PENYEMBUNYIAN TEKS TERENKRIPSI PADA CITRA RGB MENGGUNAKAN METODA LSB DENGAN POLA ZIG-ZAG." Masyarakat Telematika Dan Informasi : Jurnal Penelitian Teknologi Informasi dan Komunikasi 10, no. 2 (2019): 18. http://dx.doi.org/10.17933/mti.v10i2.152.
Full textSoetarmono, Anggya N. D. "STUDI MENGENAI APLIKASI STEGANOGRAFI CAMOUFLAGE." Teknika 1, no. 1 (2012): 55–65. http://dx.doi.org/10.34148/teknika.v1i1.7.
Full textLaila Qadriah, Sayed Achmady,. "OPTIMALISASI STEGANOGRAFI AUDIO UNTUK PENGAMANAN INFORMASI." Jurnal Sains Riset 10, no. 1 (2020): 45–50. http://dx.doi.org/10.47647/jsr.v10i1.218.
Full textPradita, Ranida, and Ida Nurhaida. "Implementasi Steganografi Video dengan Menggunakan Metode Egypt, Least Significant Bit (LSB) dan Least Significant Bit (LSB) Fibonacci Edge Pixel." Jurnal Telekomunikasi dan Komputer 10, no. 1 (2020): 25. http://dx.doi.org/10.22441/incomtech.v10i1.7282.
Full textDissertations / Theses on the topic "Steganografie"
Poremba, Tomáš. "Digitální steganografie a stegoanalýza." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385979.
Full textHärö, Jonny. "Steganografi : Hur steganografi kan påverka nätverkssäkerhet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20107.
Full textStensmar, Isak. "Steganografi i bilder : En studie om bildformat och visuella bildrepresentationens påverkan vid lagring av data med hjälp av en steganografisk metod." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12887.
Full textMorkus, Filip. "Program pro skrývání dat v obrazových souborech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218835.
Full textHrebíček, Martin. "Skrytí dat v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236211.
Full textPruccoli, Maichol. "Steganografia di immagini." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textKortus, Jiří. "Laboratorní úloha skrývání dat ve zvukovém záznamu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220666.
Full textPaladino, Pasquale. "La Steganografia e i suoi molteplici usi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1962/.
Full textBayer, Peter, and Henrik Widenfors. "Information Hiding : Steganografic Content in Streaming Media." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2298.
Full textNorman, Anton, and Niklas Paulsson. "En ny metod för steganalys." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-29532.
Full textBooks on the topic "Steganografie"
Amato, Nicola. La steganografia da Erodoto a Bin Laden: Viaggio attraverso le tecniche elusive della comunicazione. 2nd ed. Italian University Press, 2009.
Find full textAmato, Nicola. La steganografia da Erodoto a Bin Laden: Viaggio attraverso le tecniche elusive della comunicazione. 2nd ed. Italian University Press, 2009.
Find full textTung-Shuen, Ho Anthony, ed. Digital watermarking: 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings. Springer, 2009.
Find full textStefan, Katzenbeisser, and Sadeghi Ahmad-Reza, eds. Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Springer, 2009.
Find full textWestfeld, Andreas. Steganographie: Grundlagen, Analyse, Verfahrensentwicklung (Xpert.press). Springer, 2006.
Find full textRous, Anne-Simone, and Martin Mulsow, eds. Geheime Post. Kryptologie und Steganographie der diplomatischen Korrespondenz europäischer Höfe während der Frühen Neuzeit. Duncker & Humblot, 2015. http://dx.doi.org/10.3790/978-3-428-54417-2.
Full textHiding in Plain Sight: Steganography and the Art of Covert Communication. Wiley, 2003.
Find full textInformation Hiding 12th International Conference Ih 2010 Calgary Ab Canada June 2830 2010 Revised Selected Papers. Springer, 2010.
Find full textBook chapters on the topic "Steganografie"
Fischer, Stephan, Achim Steinacker, Reinhard Bertram, and Ralf Steinmetz. "Copyrights / Steganographie." In Open Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-47643-3_9.
Full textFranz, Elke. "Steganographie unter Erhalt statistischer Merkmale." In Verlässliche IT-Systeme 2001. Vieweg+Teubner Verlag, 2001. http://dx.doi.org/10.1007/978-3-663-05918-9_16.
Full textConference papers on the topic "Steganografie"
Takano, Shuichi, Kiyoshi Tanaka, and Tatsuo Sugimura. "Steganograpic image transformation." In Electronic Imaging '99, edited by Ping W. Wong and Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344686.
Full text