SteganographySpeaker: Chuck Easttom
Topic(s): Networks and Communications , Security and Privacy , Computational Theory, Algorithms and Mathematics
AbstractThis lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more advanced methods and algorithms. The lecture also describes distributed steganography, something the speaker has two patents for. Finally, the discussion moves to digital forensics and steganography, including methods for detecting steganography.
About this LectureNumber of Slides: 25
Duration: 60 - 70 minutes
Languages Available: English
Request this Lecture
To request this particular lecture, please complete this online form.
Request a Tour
To request a tour with this speaker, please complete this online form.
All requests will be sent to ACM headquarters for review.