Index_N


M

Machado, Romana, 112

Macrovision, 156

Madame Defarge, 32

Madison Project, 171–172

Magic Folders (steganography software), 123

MagicGate copyright protection technology, 173–174

MagiCheck (watermarking software), 160

MagicTag (watermarking software), 160

Maher, Kevin, 144

Mail filters, 9

MAIM 2.0 image watermarking, 158

Malicious attack, 7

MAO audio watermarking, 158

MarcSpider image tracking, 155

MarkAny, 157–158

MarkAny Light-Right DRM (digital rights management), 157

MarkAny Web Safer, 157

Marks, 95

Mary, Queen of Scots, 23

MASKER (steganography software), 123

Masking, 43, 53

Mass media, 32–33

MCY, 176–177

MDC encryption algorithm, 132

MediaBridge watermarking, 155

MediaSec, 158

MediaSignDigital watermarking, 158

MediaSignPrint watermarking, 159

Medical imaging, 165–166

Medical records, 165–166

Menet Khufu, Egypt, 15–16

Mercury (book), 22

Mercury encryption algorithm, 104

MergeStreamsRijnadael encryption algorithm, 123

Metaphors, 43

Meteor scatter method, 12

Microdots, 8, 47–48, 153–154

Microphotography, 25, 47

Military cryptography, 22

Milk, 12

Ming dynasty, 18

Minutemen missiles, 34

MJuice, 176

Monkey wrench (quilt coding), 26

Moon cakes, 18

Moon Festival, 18

Mosaic attack, 94, 198

Moving images, 54

MP3 files, 176–177

MP3 Stego (steganography software), 123

MPEG-2 compression, 183

.Mpeg files, 54, 184

MTL Systems Inc., 159

M-Trax technology, 176–177

Multimedia Contents Safer watermarking, 157

Muse project, 178–179

Musical notes, 18, 44




Investigator's Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net