An Overview of Steganography for the Computer Forensics Examiner
Peer Review for material titled "An Overview of Steganography for the Computer Forensics Examiner"
User Rating for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Member Comments for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Personal Collections for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Learning Exercises for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Accessibility Info for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II




        

Search > Material Results >

An Overview of Steganography for the Computer Forensics Examiner

        

An Overview of Steganography for the Computer Forensics Examiner

Logo for An Overview of Steganography for the Computer Forensics Examiner
Created as a training tool for computer forensics technicians, this website provides an abundance of information on the art of steganography. It explains common applications in modern society, offers examples of tools to both implement and detect its use, and approaches steganography from the viewpoint of our own national security. Perhaps most impressive is the detail in which the applications are described, from disguising one image within another, to placing secret messages inside of... More
Material Type: Presentation
Date Added to MERLOT: December 01, 2007
Date Modified in MERLOT: February 17, 2012
Author:

Quality

  • Reviewed by members of Editorial board for inclusion in MERLOT.
    Editor Review
    Very good quality; in queue to be peer reviewed
    avg: 5 rating
  • User Rating (not rated)
  • Comments (none)
  • Learning Exercises (none)
  • Personal Collections (1)
  • Accessibility Info (none)

About

Primary Audience: Professional
Mobile Compatibility: Not specified at this time
Language: English
Cost Involved: unsure
Source Code Available: unsure
Accessiblity Information Available: unsure
Creative Commons: unsure

Connections





QR Code for this Page

Browse in Categories

Discussion

Discussion for An Overview of Steganography for the Computer Forensics Examiner

Log in to participate in the discussions or Register if you are not already a MERLOT member.

Return to Top of Page