3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Foundations and Practice of Security 

      Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Author and book information

          Book Chapter
          1996
          June 9 2005
          : 7-21
          10.1007/3-540-61996-8_28
          ad15fc6a-e42b-4fa7-98ad-2a8d0e33378e
          History

          Comments

          Comment on this book

          Book chapters

          Similar content7,061

          Cited by3