steganography

  • 101Geber — For the 12th century astronomer, see Jabir ibn Aflah. For the anonymous 14th century Spanish alchemist, see Pseudo Geber. For the crater, see Geber (crater). Infobox Muslim scholars notability = Muslim scientist era = Islamic Golden Age color =… …

    Wikipedia

  • 102Cryptogram — For other uses, see Cryptogram (disambiguation). Not to be confused with cryptogam, the plants which reproduce by using spores. Example cryptogram. A cryptogram is a type of puzzle which consists of a short piece of encrypted text. Generally the… …

    Wikipedia

  • 103Chaffing and winnowing — is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with… …

    Wikipedia

  • 104Information hiding — This article is about the computer programming concept. For the practice of hiding data in a message or file, see Steganography. For data encryption, see Obfuscated code. In computer science, information hiding is the principle of segregation of… …

    Wikipedia

  • 105Reverse speech — This article is about the theory of reversed messages in normal speech. For hidden messages in recordings, see backmasking. For the act of speaking backwards, see phonetic reversal. Reverse speech is a pseudoscience[1][2][3] first advocated by… …

    Wikipedia

  • 106Deception — For other uses of deception and deceit, see Deception (disambiguation) and Deceit (disambiguation). For other uses of mystification and mystify, see Mystify (disambiguation) Further information: Bad Faith Deception, beguilement, deceit, bluff,… …

    Wikipedia

  • 107Index of coincidence — In cryptography, coincidence counting is the technique (invented by William F. Friedman[1]) of putting two texts side by side and counting the number of times that identical letters appear in the same position in both texts. This count, either as …

    Wikipedia

  • 108Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… …

    Wikipedia

  • 109-graphy — is an English suffix. Words that include the suffix usually are about a work, an art, or a field of study. Contents 1 Etymology 2 Arts 2.1 Writing 2.2 Science …

    Wikipedia

  • 110Cryptographically secure pseudorandom number generator — A cryptographically secure pseudo random number generator (CSPRNG) is a pseudo random number generator (PRNG) with properties that make it suitable for use in cryptography. Many aspects of cryptography require random numbers, for example: Key… …

    Wikipedia