Freenet
Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishi...
Freenet - Wikipedia
Cryptography
Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure ...
Cryptography - Wikipedia
Polybius square
In cryptography, the Polybius square, also known as the Polybius checkerboard, is a device invented by the Ancient Greek historian and scholar Polybius, for fractionating plaintext characters so that ...
Mimic function
A mimic function changes a file so it assumes the statistical properties of another file . That is, if is the probability of some substring occurring in , then a mimic function , recodes so that ...
Microprinting
Microprinting is one of many anti-counterfeiting techniques used most often on currency and bank checks, as well as various other items of value. Microprinting involves printing very small text, usual...
Microprinting - Wikipedia
Public-key cryptography
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public....
Public-key cryptography - Wikipedia
Steganography
Steganography (/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the art or practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography co...
Steganography - Wikipedia
StegoShare
StegoShare is a steganography tool, that allows to embed large files into multiple images. It may be used for anonymous file sharing.
Clipper chip
The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device, with a built-in backdoor, intended to be adopted by telecomm...
Clipper chip - Wikipedia
Microdot
A microdot is text or an image substantially reduced in size onto a small disc to prevent detection by unintended recipients. Microdots are normally circular around one millimetre in diameter but can ...
Microdot - Wikipedia
Steganography tools
A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.It is not necessary to conceal the message in the origina...
Steganography tools - Wikipedia
Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a...
Canary trap
A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. Special attention is ...
Bacon's cipher
Bacon's cipher or the Baconian cipher is a method of steganography (a method of hiding a secret message as opposed to a true cipher) devised by Francis Bacon in 1605. A message is concealed in the pre...
BPCS-Steganography
BPCS-Steganography (Bit-Plane Complexity Segmentation Steganography) is a type of digital steganography.Digital steganography can hide confidential data (i.e. secret files) very securely by embedding...
Invisible ink
Invisible ink, also known as security ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means. Invisible ink is o...
Invisible ink - Wikipedia
Printer steganography
Printer steganography is a type of steganography – "hiding data within data" – produced by laser printers, including Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ri...
Printer steganography - Wikipedia
Steganographic file system
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size f...
Peter Wayner
Peter Wayner is a writer known for his books on technology and his writing for publications like The New York Times, InfoWorld, and Wired magazine. His work on mimic functions, a camouflaging techniqu...
OpenPuff
OpenPuff Steganography and Watermarking, sometimes abbreviated OpenPuff or Puff, is a freeware steganography tool for Microsoft Windows created by Cosimo Oliboni and still maintained as independent so...
OpenPuff - Wikipedia
History of cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of met...
History of cryptography - Wikipedia
Null cipher
A null cipher is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. It would today be regarded as a simple form of steganography. Null ciphers can ...
File Camouflage
Steganography (/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the art or practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography co...
File Camouflage - Wikipedia
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
Export of cryptography
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.In the early days of the Cold War, the U.S. and its allies developed an elabora...
Johannes Trithemius
Johannes Trithemius (1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath active in the German Renaissance, as a lexicographer, chronicler, crypto...
Johannes Trithemius - Wikipedia
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanaly...
Cryptanalysis - Wikipedia
Steganalysis
Steganalysis is the study of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography.
The goal of steganalysis is to identify suspected packages, ...
Covert channel
In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communic...