Chapter One: Introduction and Historical Background Chapter Two: Data Hiding Using Simple Methods Chapter Three: Data Hiding Using Steganographic Techniques Chapter Four: Data Hiding Under Windows® OS File Structure Chapter Five: Data Hiding Using Encryption Techniques Chapter Six: Data Hiding Forensics Chapter Seven: Anti-Forensic Techniques Chapter Eight: Future Trends
Note: Description based on CIP data; item not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.