Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
37 open access dissertations and theses found for:
if(Steganography)  »   Refine Search
1.
Imperfect stegosystems—Asymptotic laws and near-optimal practical constructions
by Filler, Tomas, Ph.D.  State University of New York at Binghamton. 2011: 182 pages; 3465618.
2.
Data Transmission Using Image Steganography in Quick Response (QR) Code
by Shah, Sunny K., M.S.  California State University, Long Beach. 2017: 66 pages; 10638623.
3.
Detection problems in watermarking, steganography, and camera identification
by Yu, Jun Eugene, Ph.D.  State University of New York at Binghamton. 2011: 113 pages; 3474057.
4.
Automated Detection of Semagram-Laden Images
by Cerkez, Paul S., Ph.D.  Nova Southeastern University. 2012: 238 pages; 3505651.
5.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
6.
7.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
8.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
9.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
10.
Advanced bit manipulation instructions: Architecture, implementation and applications
by Hilewitz, Yedidya, Ph.D.  Princeton University. 2008: 232 pages; 3332424.
11.
Image enhancement using a joint algorithm of white balancing and contrast enhancement
by Avuthu, Lakshmidhar Reddy, M.S.  California State University, Long Beach. 2016: 42 pages; 10111199.
12.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
13.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
15.
Threat Modeling and Circumvention of Internet Censorship
by Fifield, David, Ph.D.  University of California, Berkeley. 2017: 96 pages; 10688573.
16.
Coherent-incoherent phenomena in nonlinear optics and imaging
by Dylov, Dmitry V., Ph.D.  Princeton University. 2010: 161 pages; 3428550.
17.
Photo forensics from partial constraints
by Kee, Eric, Ph.D.  Dartmouth College. 2013: 124 pages; 3613660.
18.
Biophysical Characterization of the Structure and Flexibility of the E. coli Ribosome
by Armbruster, Emily Doris, Ph.D.  University of Missouri - Columbia. 2019: 141 pages; 27543964.
19.
Facilitating Frame Injection Exploits through SiK Radio Firmware Modification
by WIss, Victor Gordon, M.S.  Christopher Newport University. 2020: 72 pages; 27956517.
20.
Digital Image Source Authentication
by Schippers, David A., D.Sc.  Capitol Technology University. 2018: 223 pages; 27828526.
22.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
23.
Software signature derivation from sequential digital forensic analysis
by Nelson, Alexander J., Ph.D.  University of California, Santa Cruz. 2016: 177 pages; 10140317.
25.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
26.
Studying Episodic Access to Personal Digital Activity: Activity Trails Prototype
by Cangiano, Gaston R., Ph.D.  University of California, San Diego. 2011: 92 pages; 3481484.
27.
Small Business Owners' Strategies for Success
by Onyenego, Ovuefelomaloye, D.B.A.  Walden University. 2018: 132 pages; 10975877.
28.
Issues with Reality: Defining and Exploring the Logics of Alternate Reality Games
by Johnson, Jay, Ph.D.  The University of Wisconsin - Milwaukee. 2018: 274 pages; 10931461.
29.
Ambient programming
by Elumeze, Nwanua Onochie, Ph.D.  University of Colorado at Boulder. 2010: 160 pages; 3433288.
30.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
1 - 30 of 37 displayed.
  1    2   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest