Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30 open access dissertations and theses found for:
if(Steganography)  »   Refine Search
1.
Imperfect stegosystems—Asymptotic laws and near-optimal practical constructions
by Filler, Tomas, Ph.D.  State University of New York at Binghamton. 2011: 182 pages; 3465618.
2.
Automated Detection of Semagram-Laden Images
by Cerkez, Paul S., Ph.D.  Nova Southeastern University. 2012: 238 pages; 3505651.
3.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
4.
5.
Detection problems in watermarking, steganography, and camera identification
by Yu, Jun Eugene, Ph.D.  State University of New York at Binghamton. 2011: 113 pages; 3474057.
6.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
7.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
8.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
9.
Data Transmission Using Image Steganography in Quick Response (QR) Code
by Shah, Sunny K., M.S.  California State University, Long Beach. 2017: 66 pages; 10638623.
10.
Advanced bit manipulation instructions: Architecture, implementation and applications
by Hilewitz, Yedidya, Ph.D.  Princeton University. 2008: 232 pages; 3332424.
11.
Image enhancement using a joint algorithm of white balancing and contrast enhancement
by Avuthu, Lakshmidhar Reddy, M.S.  California State University, Long Beach. 2016: 42 pages; 10111199.
12.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
14.
Coherent-incoherent phenomena in nonlinear optics and imaging
by Dylov, Dmitry V., Ph.D.  Princeton University. 2010: 161 pages; 3428550.
15.
Threat Modeling and Circumvention of Internet Censorship
by Fifield, David, Ph.D.  University of California, Berkeley. 2017: 96 pages; 10688573.
17.
Photo forensics from partial constraints
by Kee, Eric, Ph.D.  Dartmouth College. 2013: 124 pages; 3613660.
18.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
19.
Software signature derivation from sequential digital forensic analysis
by Nelson, Alexander J., Ph.D.  University of California, Santa Cruz. 2016: 177 pages; 10140317.
21.
Small Business Owners' Strategies for Success
by Onyenego, Ovuefelomaloye, D.B.A.  Walden University. 2018: 132 pages; 10975877.
22.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
23.
Studying Episodic Access to Personal Digital Activity: Activity Trails Prototype
by Cangiano, Gaston R., Ph.D.  University of California, San Diego. 2011: 92 pages; 3481484.
24.
Issues with Reality: Defining and Exploring the Logics of Alternate Reality Games
by Johnson, Jay, Ph.D.  The University of Wisconsin - Milwaukee. 2018: 274 pages; 10931461.
25.
Sparse approximation and atomic decomposition: Considering atom interactions in evaluating and building signal representations
by Townsend Sturm, Bobby Lee, Jr., Ph.D.  University of California, Santa Barbara. 2009: 276 pages; 3350384.
26.
Ambient programming
by Elumeze, Nwanua Onochie, Ph.D.  University of Colorado at Boulder. 2010: 160 pages; 3433288.
27.
Trauma, 9/11, and the limits of affective materialism
by Reiser, Julie, Ph.D.  The Johns Hopkins University. 2009: 166 pages; 3395673.
28.
A model of online education effecting holistic student formation appropriate for global cross-cultural contexts
by Hannaford, Ronald Geoffrey, Ph.D.  Fuller Theological Seminary, School of Intercultural Studies. 2012: 303 pages; 3507295.
29.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
30.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
1 - 30 of 30 displayed.
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest