|
Camera/Shy (steganography software), 102
Camouflage (steganography software), 103–104, 187
Captioning, 85–86
CaptureMark watermarking technology, 162
Cardano, Girolamo, 13, 20–21
Cardano grille, 13–14, 20–21, 45
Carrier pigeons, 24–25
Carrier signals, 52
Cast-256 encryption algorithm, 112, 123
Censors, 32–33
Central Research Laboratories, 153
CenturionSoft, 152–153
Certificate authority, 173–174
CFG (context-free grammar), 43, 124
CGMS (copy generation management system), 183
Chess games, 32
Children's pictures, 32
Chinese, use of steganography by, 18
Chosen-message attack, 77, 193, 196
Chosen-stego attack, 77, 192, 195
Ciphertext, 43, 169
Clearinghouse (cryptolope), 173
Cleartext watermarks, 90–91
Cloak (steganography software), 104
Cobalt oxide, 12
Cochlea, 52
Codes, 1
Cold War, 13
Collusion attack, 92, 196
Color palletes, 190
Common signal processing, 83
Compression, 49–51
robustness of watermarks to, 83
and watermarking, 90–91
Compris, 151
Computer-based methods, 48
ConfirMedia, 162
Content scrambling system (CSS), 184
Context-free grammar (CFG), 43, 124
Continuous fingerprinting, 96
Contraband (steganography software), 104, 105–106
Copy generation management system (CGMS), 183
Copy Protection Technical Working Group, 183
Copyright protection, 147, 175–176
Courier (steganography software), 104
Cover files, 58
Cover generation methods, 42
Cover medium, 77, 193
Cover objects, 7, 38
Covert_tcp program, 71–72
Crawl, 179
Cropping, 92, 94, 198
Crossroads (quilt coding), 28
Crossword puzzles, 32
Crypto 123 (encryption software), 107
Cryptography, 5
in Revolutionary War, 24
vs. steganography, 5–6
telegraph in, 22
Cryptolope, 172–174
Crytoraphie Militaire, La (book), 22
CSS (content scrambling system), 184
Cues, 44
Culpers, 23–24
Cult of the Dead Cow, 103
|