Overview
Introduction
Current “hacker” cryptographic systems
Steganography definition and history
Modern Steganography
The “Three D’s” of defeating steganography
Sample use of steganography (Elonka Code)
Summary
Bibliography / recommended reading