CINXE.COM

"Information hiding" -wikipedia - Google Search

<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-SG"><head><meta content="application/xhtml+xml; charset=UTF-8" http-equiv="Content-Type"/><meta content="no-cache" name="Cache-Control"/><title>"Information hiding" -wikipedia - Google Search</title><style>a{text-decoration:none;color:inherit}a:hover{text-decoration:underline}a img{border:0}body{font-family:arial,sans-serif;padding:8px;margin:0 auto;max-width:700px;min-width:240px;}.FbhRzb{border-left:thin solid #dadce0;border-right:thin solid #dadce0;border-top:thin solid #dadce0;height:40px;overflow:hidden}.n692Zd{margin-bottom:10px}.cvifge{height:40px;border-spacing:0}.QvGUP{height:40px;padding:0 8px 0 8px;vertical-align:top}.O4cRJf{height:40px;width:100%;padding:0;padding-right:16px}.O1ePr{height:40px;padding:0;vertical-align:top}.kgJEQe{height:36px;width:98px;vertical-align:top;margin-top:4px}.lXLRf{vertical-align:top}.MhzMZd{border:0;vertical-align:middle;font-size:14px;height:40px;padding:0;width:100%;padding-left:16px}.xB0fq{height:40px;border:none;font-size:14px;background-color:#1a73e8;color:#fff;padding:0 16px;margin:0;vertical-align:top;cursor:pointer}.xB0fq:focus{border:1px solid #1a73e8}.M7pB2{border:thin solid #dadce0;margin:0 0 3px 0;font-size:13px;font-weight:500;height:40px}.euZec{width:100%;height:40px;text-align:center;border-spacing:0}table.euZec td{padding:0;width:25%}.QIqI7{display:inline-block;padding-top:4px;font-weight:bold;color:#4285f4}.EY24We{border-bottom:2px solid #4285f4}.CsQyDc{display:inline-block;color:#70757a}.TuS8Ad{font-size:14px}.HddGcc{padding:8px;color:#70757a}.dzp8ae{font-weight:bold;color:#3c4043}.rEM8G{color:#70757a}.bookcf{table-layout:fixed;width:100%;border-spacing:0}.InWNIe{text-align:center}.uZgmoc{border:thin solid #dadce0;color:#70757a;font-size:14px;text-align:center;table-layout:fixed;width:100%}.frGj1b{display:block;padding:12px 0 12px 0;width:100%}.BnJWBc{text-align:center;padding:6px 0 13px 0;height:35px}</style></head><body><style>.ezO2md{border:thin solid #dadce0;padding:12px 16px 12px 16px;margin-bottom:10px;font-family:arial,sans-serif}.lIMUZd{font-family:arial,sans-serif}.Dks9wf{width:100%}.KZhhub{border-spacing:0;width:100%}.udTCfd{vertical-align:top;width:100%}.fYyStc{word-break:break-word}.ynsChf{display:block;white-space:nowrap;overflow:hidden;text-overflow:ellipsis}.Fj3V3b{color:#1967d2;font-size:14px;line-height:20px}.FrIlee{color:#202124;font-size:13px;line-height:20px}.F9iS2e{color:#70757a;font-size:13px;line-height:20px}.WMQ2Le{color:#70757a;font-size:12px;line-height:16px}.x3G5ab{color:#202124;font-size:18px;line-height:24px}.fuLhoc{color:#1967d2;font-size:18px;line-height:24px}.epoveb{font-size:32px;line-height:40px;font-weight:400;color:#202124}.dXDvrc{color:#0d652d;font-size:14px;line-height:20px;word-wrap:break-word}.dloBPe{font-weight:bold}.YVIcad{color:#70757a}.JkVVdd{color:#ea4335}.oXZRFd{color:#ea4335}.MQHtg{color:#fbbc04}.pyMRrb{color:#1e8e3e}.EtTZid{color:#1e8e3e}.M3vVJe{color:#1967d2}.qXLe6d{display:block}.NHQNef{font-style:italic}.Cb8Z7c{white-space:pre}a.ZWRArf{text-decoration:none}a .CVA68e:hover{text-decoration:underline}.gNEi4d{table-layout:fixed}.Y0aAmf{text-align:center}.iUhyd{vertical-align:bottom}.CO79Sb{position:relative}.WQbFld{bottom:0;left:0;margin:auto;position:absolute;right:0;top:0;background-image:url(https://www.gstatic.com/search_trustx/visibility_off_icon_p0-7d897bf44bafe5436baa9009e8716337.png);background-repeat:no-repeat;background-position:center;background-size:20px}.CSfvHb{padding-bottom:8px}.GN4D8d{margin:0}</style><div class="n692Zd"><div class="BnJWBc"><a class="lXLRf" href="/?sca_esv=8d419a3d49aff387&amp;output=search&amp;tbm=bks&amp;sa=X&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQPAgC"><img class="kgJEQe" src="/images/branding/searchlogo/1x/googlelogo_desk_heirloom_color_150x55dp.gif" alt="Google"/></a></div><div class="FbhRzb"><form action="/search"><input name="sca_esv" value="8d419a3d49aff387" type="hidden"/><input name="tbm" value="bks" type="hidden"/><input name="oq" type="hidden"/><input name="aqs" type="hidden"/><table class="cvifge"><tr><td class="O4cRJf"><input class="MhzMZd" value='"Information hiding" -wikipedia' name="q" type="text"/></td><td class="O1ePr"><input class="xB0fq" value="Search" type="submit"/></td></tr></table></form></div><div class="M7pB2"><table class="euZec"><tbody><tr><td><a class="CsQyDc" href="/search?q=%22Information+hiding%22+-wikipedia&amp;sca_esv=8d419a3d49aff387&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ_AUIBCgA">ALL</a></td><td><a class="CsQyDc" href="/search?q=%22Information+hiding%22+-wikipedia&amp;sca_esv=8d419a3d49aff387&amp;tbm=isch&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ_AUIBSgB">IMAGES</a></td><td><a class="CsQyDc" href="/search?q=%22Information+hiding%22+-wikipedia&amp;sca_esv=8d419a3d49aff387&amp;tbm=nws&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ_AUIBigC">NEWS</a></td><td class="EY24We"><span class="QIqI7">BOOKS</span></td></tr></tbody></table></div></div><div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=EA2_A-l7FiMC&amp;pg=PA357&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgJEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: 7th International Workshop, IH 2005, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=EA2_A-l7FiMC&amp;pg=PA357&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgJEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=EA2_A-l7FiMC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Information hiding has been studied in many security appli- cations such as authentication, copyright management and digital foren- sics. In this work, we introduce a new application where successful in- formation hiding in compiled ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=v8LrG6z-L3oC&amp;pg=PA178&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgNEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: 6th International Workshop, IH 2004, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=v8LrG6z-L3oC&amp;pg=PA178&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgNEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=v8LrG6z-L3oC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Information Hiding : Proceedings of the Third International Workshop . Volume 1768 of Lecture Notes in Computer Science . , Dresden , Germany , Springer ( 1999 ) 1-16 [ 20 ] Zöllner , J. , Federrath , H. , Klimant , H. , Pfitzmann , A ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=rDZql9oYB0wC&amp;pg=PA313&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgMEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: 8th International Workshop, IH 2006, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=rDZql9oYB0wC&amp;pg=PA313&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgMEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=rDZql9oYB0wC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... information hiding (1999) 13. Reyzin, L., Russell, S.: More efficient provably secure steganography. Technical report, IACR ePrint Archive 2003/093 (2003) 14. Simmons, G.J.: The prisoner's problem and the subliminal channel. In: Chaum ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=gWdiyTlEBIIC&amp;pg=PA295&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgIEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: First International Workshop, Cambridge, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=gWdiyTlEBIIC&amp;pg=PA295&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgIEAI"><table class="gNEi4d"><tbody><tr><td style="width:53px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=gWdiyTlEBIIC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=53" style="width:53px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Information Hiding Workshop held in Cambridge , England , the adjectives cover , embedded , and steyo were choosen to describe the various signals used in data hiding . The term " cover " signal is used to describe the original signal ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=29XgBwAAQBAJ&amp;pg=PA7&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgLEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: Steganography and Watermarking-Attacks ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=29XgBwAAQBAJ&amp;pg=PA7&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgLEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=29XgBwAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... without significant change to the work . 1.3.5 Hiding in Audio and Images Many different methods for Information Hiding : Steganography and Watermarking 7 Hiding in Disk Space Hiding in Network Packets Hiding in Software and Circuitry.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=vf6OCwAAQBAJ&amp;pg=PT258&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgFEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding in Communication Networks: Fundamentals, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=vf6OCwAAQBAJ&amp;pg=PT258&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgFEAI"><table class="gNEi4d"><tbody><tr><td style="width:53px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=vf6OCwAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=53" style="width:53px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... information hiding methods are a powerful toolset and a dual - use good — like any tools , information hiding methods can be used for “ good ” or “ bad ” purposes . In the closing remarks we raise some significant questions , which ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=LG6PCwAAQBAJ&amp;pg=PA198&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgGEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=LG6PCwAAQBAJ&amp;pg=PA198&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgGEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=LG6PCwAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Information Hiding conference , Vol . 6958 of Lecture Notes in Computer Science , 2011 , pp . 28–42 . [ 20 ] Laarhoven , T. , “ Capacities and capacity - achieving decoders for various fingerprinting games , " in ACM Information Hiding ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=sWJqCQAAQBAJ&amp;pg=PA268&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgKEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: Third International Workshop, IH'99, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=sWJqCQAAQBAJ&amp;pg=PA268&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgKEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=sWJqCQAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Information Hiding, Portland, OR, 15-17 April, 1998. Springer Lecture Notes on Computer Science, No. 1525, pp. 258-272, pp. 329-343. 255, 256, 257, 265 8. J.P.M.G. Linnartz, A.C.C. Kalker, G.F. Depovere and R. Beuker, “A reliability ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=jCKL2tSwwVMC&amp;printsec=frontcover&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgEEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: 5th International Workshop, IH 2002, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=jCKL2tSwwVMC&amp;printsec=frontcover&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgEEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=jCKL2tSwwVMC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=1XKqCAAAQBAJ&amp;pg=PA60&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6AF6BAgHEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Information Hiding: Second International Workshop, IH’98, ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=1XKqCAAAQBAJ&amp;pg=PA60&amp;dq=%22Information+hiding%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQ6wF6BAgHEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Information hiding" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=1XKqCAAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 279–294. Springer-Verlag, Berlin, 1996. [6] F. Hartung and B. Girod. Fast public-key watermarking of compressed video. Proceedings ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div></div><table class="uZgmoc"><tbody><td><a class="frGj1b" href="/search?q=%22Information+hiding%22+-wikipedia&amp;sca_esv=8d419a3d49aff387&amp;tbm=bks&amp;ei=2ZhHZ_WmBdqt4-EPlo6zIA&amp;start=10&amp;sa=N">Next&nbsp;&gt;</a></td></tbody></table><br/><div class="TuS8Ad" data-ved="0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQpyoIMQ"><style>.VYM29{font-weight:bold}</style><div class="HddGcc" align="center"><span class="VYM29">Singapore</span><span>&nbsp;-&nbsp;</span><span>From your IP address</span><span>&nbsp;-&nbsp;</span><a href="/url?q=https://support.google.com/websearch%3Fp%3Dws_settings_location%26hl%3Den-SG&amp;opi=89978449&amp;sa=U&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQty4IMg&amp;usg=AOvVaw1isxrEdYBwiIZquX57aIBv">Learn more</a></div><div align="center"><a class="rEM8G" href="/url?q=https://accounts.google.com/ServiceLogin%3Fcontinue%3Dhttps://www.google.com/search%253Ftbs%253Dbks:1%2526q%253D%252522Information%252Bhiding%252522%252B-wikipedia%26hl%3Den&amp;opi=89978449&amp;sa=U&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQxs8CCDM&amp;usg=AOvVaw0ATDtmhn3NLZShMdz_wjGj">Sign in</a></div><div><table class="bookcf"><tbody class="InWNIe"><tr><td><a class="rEM8G" href="https://www.google.com/preferences?hl=en&amp;sa=X&amp;ved=0ahUKEwi195ngw_2JAxXa1jgGHRbHDAQQv5YECDQ">Settings</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/privacy/">Privacy</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/terms/">Terms</a></td></tr></tbody></table></div></div><div> </div></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10