|
Dark Files (steganography software), 107
Data dots, 154
Data Dot Technologies Ltd., 153–154
Data hiding, 85
DataHiding, 89
DataMark Technologies, 154
Data smuggling, 75
Data Stash (steganography software), 107
DCT (discrete cosine transform), 49–51, 54
Defarge, Madame, 32
De Furtivis Literam Notis (book), 20
Demaratus, 16–17
Denton, Jeremiah, 33
DES encryption algorithm, 132
Desktop icons, 118–119
Destination host, 72
Detection, 187–191
Detection-disabling attack, 92
Detection-sensitivity-based classification, 96
Dialects, 1
Dictionary attacks, 189
Differential phase variation, 54–55
Digimarc , 154
Digimarc ImageBridge watermarking, 154
Digimarc MarcSpider image tracking, 155
Digimarc MediaBridge watermarking, 155
Digital cover, 39
Digital fingerprinting, 96
Digital music, 169–170
Digital Picture Envelope (steganography software), 107–108
Digital policy management (DPM), 156
Digital rights management (DRM), 156, 170–171, 175–176
Digital-to-analog conversion, 83, 92
Digital video watermarking, 149
Digital watermarking, see Watermarking
Direct sequence, 41–42
Disabling attacks, 193–196
Disconcert, 179
Discrete cosine transform (DCT), 49–51, 54
Discrete fingerprinting, 96
Discrete Fourier transform, 51–52
Disk Hide (steganography software), 108
Disk space, hiding in, 58–66
Distortion techniques, 42
Distributors, 96
Dithering manipulation, 53
DNA microdots, 166–167, 168
.Doc files, 126
Document Safer watermarking, 157
Double wedding rings (quilt coding), 29
Dound (steganography software), 108, 109
DPM (digital policy management), 156
DPT 32 (encryption software), 108, 110
DriveCrypt (steganography software), 108
Drive Hider (steganography software), 108–109
DRM (digital rights management), 156, 170–171, 175–176
Drunkard's path (quilt coding), 30
DVD-Audio disks, 177
DVD (digital video discs), 85–86, 183–184
|