Speaker:  Chuck Easttom – Plano, TX, United States
Topic(s):  Computational Theory, Algorithms and Mathematics


This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more advanced methods and algorithms.  The lecture also describes distributed steganography, something the speaker has two patents for.  Finally, the discussion moves to digital forensics and steganography, including methods for detecting steganography.

About this Lecture

Number of Slides:  25
Duration:  60 - 70 minutes
Languages Available:  English
Last Updated: 

Request this Lecture

To request this particular lecture, please complete this online form.

Request a Tour

To request a tour with this speaker, please complete this online form.

All requests will be sent to ACM headquarters for review.