Integrated Research in Steganography
List Price:
$74.95
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Audrey Coon
Format:
Hardcover
Pages:
102
Publisher:
CLANRYE INTERNATIONAL (February 10, 2015)
Language:
English
ISBN-13:
9781632403131
ISBN-10:
1632403137
Dimensions:
5.98" x 9.02"
File:
TWO RIVERS-PERSEUS-Metadata_Only_Perseus_Distribution_Customer_Group_Metadata_20250917125235-20250918.xml
Folder:
TWO RIVERS
List Price:
$74.95
Case Pack:
54
As low as:
$65.21
Publisher Identifier:
P-PER
Discount Code:
F
Pub Discount:
45
Weight:
10.88oz
Imprint:
CLANRYE INTERNATIONAL
Overview
Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future of internet privacy and security. This book emphasizes a novel field of study in steganography. They are the underlying science and art of communicating which keep the existence of the communication hidden. This book provides a broad overview of this technology by introducing distinct and latest concepts of steganography and steganalysis. The book also briefly covers the history of steganography and evaluates steganalysis methods considering their modeling techniques. It also presents some new steganography techniques for hiding secret data in images. The book also analyzes steganography in speeches and presents a new approach for concealing data in speeches.








