Audio Communications Controller
A poem or series of lines in which certain letters, usually the first in each line, form a name, motto, or message when read in sequence.
An image or the production of an image that appears distorted unless it is viewed from a special angle or with a special instrument.
The state in which something is unknown or unacknowledged.
A condition where one sound interferes with the perception of another sound.
An extraction process method that can recover the hidden message only by means of the encoded data.
An unauthorized recording of a live or broadcast performance, which is duplicated and sold without the permission of the artist, composer, or record company.
A steganographic cipher used by Francis Bacon to insert his name within the text of his writings.
A method of concealing a message by which a piece of paper has several holes cut in it (the grille), and when it is placed over an innocent-looking message the holes cover all but specific letters, spelling out the message. It was named for its inventor, Girolamo Cardano.
A type of attack where the steganalyst generates a stego-medium from a message using some particular tool, looking for signatures that will enable the detection of other stego-media.
A type of attack where both the stego-medium and the steganography tool or algorithm are available.
An additive cipher device used for encrypting and decrypting messages. The disk consists of two concentric circular scales, usually of letters, and the alphabets can be repositioned with respect to one another at any of the 26 relationships.
A number or symbol multiplied with a variable or an unknown quantity in an algebraic term.
A set of available colors a computer or an application can display. Also known as a CLUT: Color Look Up Table.
A method of storing data in a format that requires less space than normal.
Duplicates that are copied and packaged to resemble the original as closely as possible. The original producer's trademarks and logos are reproduced in order to mislead the consumer into believing that he is buying an original product.
An extraction process method that needs both the original piece of information and the encoded one in order to extract the embedded data.
The medium in which data is hidden; it can be an innocent-looking piece of information for steganography, or an important medium that must be protected for copyright or integrity reasons.
A channel of communication within a computer system or network that is not designed or intended to transfer information.
Cryptographic envelope, an IBM product. Cryptolope objects are used for secure, protected delivery of digital content by using encryption and digital signatures.