National Repository of Grey Literature 35 records found  beginprevious31 - 35  jump to record: Search took 0.00 seconds. 
Hiding Data in Computer Networks
Hrebíček, Martin ; Halfar, Patrik (referee) ; Polčák, Libor (advisor)
This diploma thesis deals with hiding data in the Internet traffic. It contains a description of the law interception. Various possibilities of hiding data are mentioned. The practical part of this thesis consists of an application that hides the data of HTTP and HTTPS protocols in a fake VoIP call. The application consists of two parts: a client and a server. Data transmitted between the client and the server parts are masked as multimedia data of the VoIP call. When a user or Internet server does not transmit any data, random data are transmitted between client and server parts in order to simulate the VoIP call. Then, the thesis focuses on detection of the attack.
A Hidden GNU/Linux File System
Pavlásek, Martin ; Smrčka, Aleš (referee) ; Lengál, Ondřej (advisor)
Some sensitive data need such a way of hiding that hides not only the content of the data but its preserve itself. The goal of this Bachelor's thesis is to create a file system that enables hiding of files with sensitive data to other files. This text contains an overview of principles used in current file systems and a description of the structure and use of the FUSE technology. Further, the work describes the design of a filesystem that hides files into ID3 tags of MP3 music files and it's implementation in C++. The created filesystem is experimentally assessed and evaluated.
Steganographic Application for Mobile Devices
Beran, David ; Janča, Radim (referee) ; Malinka, Kamil (advisor)
This paper discusses selection of suitable steganographic method for mobile platform and its implementation. F4 method was selected and implemented as an application Stego and its extension Reveal for iOS devices.
Software for data hiding in image files
Morkus, Filip ; Říha, Kamil (referee) ; Burda, Karel (advisor)
In my master's thesis I start fromthedescriptionofthebasics and thebeginningsofsteganography, itsmethods and purposes. Detaileddescriptionof BMP fileswithhidden data follows. A filestructureisanalysedintothesmallestdetails to avoiddamagingfilewhilehiding. At thesametime to make profit oftheinformationincluded in a fileheader in the most effectiveway. Anotheraimwas to explain a principalofsteganographicalmethoditself, usedforhiding data into BMP file. Based on these findings, a programmeconceptwasdesigned and consequentlythatprogrammewas made. Itcarriesoutthehiding and revealing data intothe image files. Directionsfor use are made to thisprogramme and thereisalso a demo ofthefeaturesdescribingeach step. At the end ofmymaster's thesis anattentionispaid to thoseinfluencesthatcanbelimitingforthismethod. Exceeding these limitswouldlead to breakingthesteganographicalmethod, whichmeansrevealingthehidden data.

National Repository of Grey Literature : 35 records found   beginprevious31 - 35  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.