|
ICBMs (intercontinental ballistic missiles), 34
Icons, 118–119
IDEA encryption algorithm, 132–136
ID field, 69–70
IDNN (Inter Deposit Digital Number), 148–149
Iliad, 17
Image authentication, 87
ImageBridge Watermarking, 154
Information hiding, issues in, 75–80
Info Stego (steganography software), 119, 121
Initial Sequence Number (ISN) field, 69–70
Injection, 37
Inner ear, 52
InPlainView (steganography software), 119
Integers, 49
Intellectual property protection systems, 170–179; see also Watermarking
cryptolope, 172–174
DRM (digital rights management), 170–171, 175–176
for DVD video, 183–184
EMMS (Electronic Music Management System), 171–172
encrypted MP3
files, 176–177
MagicGate, 174–175
Open MG, 174–175
Intel x86 instruction set, 146
Intercontinental ballistic missiles (ICBMs), 34
Inter Deposit Digital Number (IDNN), 148–149
Internet, 179–180
Internet transmissions, 3
Inter-sentence spacing, 56
InterTrust, 156, 171
Inter-word spacing, 56
InThePicture (steganography software), 119–121
Invisible characters, 190
Invisible Files 2000 Pro (steganography software), 121
Invisible inks, 12, 22, 23, 47
Invisible Secrets (steganography software), 122
Invisible watermarks, 85, 85–86
IP addresses, spoofing of, 72–74
IP (Internet Protocol), 69–70
ISN (Initial Sequence Number) field, 69–70
Italian Renaissance, 10
|