Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
Sensitive government information, child pornography, and proprietary information have been leaking through cyberspace. While law enforcement agencies, private companies and government agencies try to cope with the spread of this material, we are developing technology for detecting these hidden data transfers. We have been developing computational techniques for the detection of digital tampering with a focus on when audio or image signals have been altered - uncovering the hidden information that lies beneath. The project focuses on the development of steganography tools. It continues into the Detection of Digital Tampering project.