|
Machado, Romana, 112
Macrovision, 156
Madame Defarge, 32
Madison Project, 171–172
Magic Folders (steganography software), 123
MagicGate copyright protection technology, 173–174
MagiCheck (watermarking software), 160
MagicTag (watermarking software), 160
Maher, Kevin, 144
Mail filters, 9
MAIM 2.0 image watermarking, 158
Malicious attack, 7
MAO audio watermarking, 158
MarcSpider image tracking, 155
MarkAny, 157–158
MarkAny Light-Right DRM (digital rights management), 157
MarkAny Web Safer, 157
Marks, 95
Mary, Queen of Scots, 23
MASKER (steganography software), 123
Masking, 43, 53
Mass media, 32–33
MCY, 176–177
MDC encryption algorithm, 132
MediaBridge watermarking, 155
MediaSec, 158
MediaSignDigital watermarking, 158
MediaSignPrint watermarking, 159
Medical imaging, 165–166
Medical records, 165–166
Menet Khufu, Egypt, 15–16
Mercury (book), 22
Mercury encryption algorithm, 104
MergeStreamsRijnadael encryption algorithm, 123
Metaphors, 43
Meteor scatter method, 12
Microdots, 8, 47–48, 153–154
Microphotography, 25, 47
Military cryptography, 22
Milk, 12
Ming dynasty, 18
Minutemen missiles, 34
MJuice, 176
Monkey wrench (quilt coding), 26
Moon cakes, 18
Moon Festival, 18
Mosaic attack, 94, 198
Moving images, 54
MP3 files, 176–177
MP3 Stego (steganography software), 123
MPEG-2 compression, 183
.Mpeg files, 54, 184
MTL Systems Inc., 159
M-Trax technology, 176–177
Multimedia Contents Safer watermarking, 157
Muse project, 178–179
Musical notes, 18, 44
|