steganography

  • 11OpenPuff — v3.40 screenshot Developer(s) Eng. Cosimo Oliboni …

    Wikipedia

  • 12Anti-computer forensics — (sometimes counter forensics) is a general term for a set of techniques used as countermeasures to forensic analysis. Contents 1 Definition 1.1 Sub categories 1.2 Purpose and goals 2 …

    Wikipedia

  • 13Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …

    Wikipedia

  • 14Printer (computing) — A modern printer with scanning/copying capability Small printer …

    Wikipedia

  • 15Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… …

    Wikipedia

  • 16Voynich manuscript — The Voynich manuscript is a mysterious illustrated book written in an indecipherable text. It is thought to have been written between 1450 and 1520. The author, script and language of the manuscript remain unknown.Over its recorded existence, the …

    Wikipedia

  • 17Acrostic — This article is about a type of poem. For the word puzzle, see Acrostic (puzzle). An acrostic (Greek: ákros top ; stíchos verse ) is a poem or other form of writing in which the first letter, syllable or word of each line, paragraph or other… …

    Wikipedia

  • 18Deniable encryption — In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that the data is encrypted, or that they are able to decrypt it[citation needed]. Such convincing denials may or may not be genuine.… …

    Wikipedia

  • 19Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… …

    Wikipedia

  • 20Concealing objects in a book — A hollowed out book, with bottle caps for scale. There are many real and fictitious occurrences of concealing objects in a book. Items can be concealed in books in a number of ways. Small items such as a photograph or a note can be hidden in… …

    Wikipedia