Click here to Skip to main content
Click here to Skip to main content
Alternatives

Steganography II - multiple key and carrier files

, 3 Apr 2004 CPOL
An article about spreading hidden data over many images.

Alternatives

Members may post updates or alternatives to this current article in order to show different approaches or add new features.

No alternatives have been posted.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

Corinna John
Software Developer
Germany Germany
Corinna lives in Hannover/Germany (CeBIT City) and works as a Delphi developer, though her favorite language is C#.

| | Privacy | Terms of Use | Mobile
Web01 | 2.8.150224.1 | Last Updated 4 Apr 2004
Article Copyright 2003 by Corinna John
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid