Esteganografia (Portuguese Wikipedia)

Analysis of information sources in references of the Wikipedia article "Esteganografia" in Portuguese language version.

refsWebsite
Global rank Portuguese rank
2nd place
4th place
1st place
1st place
5th place
5th place
18th place
51st place
69th place
195th place
120th place
157th place
low place
low place
670th place
686th place
low place
low place
low place
low place
209th place
227th place
low place
low place
8,545th place
4,033rd place
207th place
589th place
958th place
9,796th place
low place
low place
193rd place
272nd place
3,475th place
5,212th place
low place
low place
11th place
968th place
low place
low place
low place
low place
low place
low place
1,672nd place
2,099th place
222nd place
196th place
652nd place
920th place
low place
low place
3,285th place
2,492nd place
918th place
1,762nd place
low place
low place
8th place
13th place
low place
low place
low place
low place
low place
low place

alternet.org

arxiv.org

bbc.co.uk

binghamton.edu

ws.binghamton.edu

  • Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W, eds. «Searching for the Stego Key» (PDF). Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. Security, Steganography, and Watermarking of Multimedia Contents VI (em inglês). 5306: 70–82. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. Consultado em 23 de janeiro de 2014 

boingboing.net

cam.ac.uk

cl.cam.ac.uk

digitale-sammlungen.de

daten.digitale-sammlungen.de

doi.org

dx.doi.org

eff.org

firstmonday.org

getpocket.com

harvard.edu

ui.adsabs.harvard.edu

  • Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W, eds. «Searching for the Stego Key» (PDF). Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. Security, Steganography, and Watermarking of Multimedia Contents VI (em inglês). 5306: 70–82. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. Consultado em 23 de janeiro de 2014 
  • Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2010). «Digital image steganography: Survey and analysis of current methods». Signal Processing (em inglês). 90 (3): 727–752. Bibcode:2010SigPr..90..727C. doi:10.1016/j.sigpro.2009.08.010 
  • Dittmann, Jana; Hesse, Danny; Hillert, Reyk (21 de março de 2005). Delp Iii, Edward J; Wong, Ping W, eds. «Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set». SPIE. Security, Steganography, and Watermarking of Multimedia Contents VII (em inglês). 5681. 607 páginas. Bibcode:2005SPIE.5681..607D. doi:10.1117/12.586579 
  • Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2009). «A skin tone detection algorithm for an adaptive approach to steganography». Signal Processing (em inglês). 89 (12): 2465–2478. Bibcode:2009SigPr..89.2465C. doi:10.1016/j.sigpro.2009.04.022 

ieee.org

spectrum.ieee.org

irevolution.wordpress.com

justice.gov

maydaymystery.org

  • «The texts». Maydaymystery.org (em inglês). Consultado em 23 de novembro de 2017 
  • «Recent things». Maydaymystery.org (em inglês). Consultado em 23 de novembro de 2017 
  • «The Mystery». Maydaymystery.org (em inglês). Consultado em 23 de novembro de 2017 

mcafee.com

merriam-webster.com

pictureworthsthousandwords.appspot.com

psu.edu

citeseerx.ist.psu.edu

pw.edu.pl

tele.pw.edu.pl

krzysiek.tele.pw.edu.pl

researchgate.net

scenariomagazine.com

secureiqlab.com

semanticscholar.org

pdfs.semanticscholar.org

tamu.edu

ece.tamu.edu

techrxiv.org

twinstate.com

blog.twinstate.com

uni-magdeburg.de

wwwiti.cs.uni-magdeburg.de

  • Kamran Ahsan; Deepa Kundur (dezembro de 2002). «Practical Data Hiding in TCP/IP» (PDF). ACM Wksp. Multimedia Security (em inglês). Consultado em 16 de junho de 2010. Arquivado do original (PDF) em 29 de outubro de 2012 

uwl.ac.uk

repository.uwl.ac.uk

votiro.com

web.archive.org

wiley.com

eu.wiley.com

wired.com

worldcat.org