This educational video explains how CA’s patented Cryptographic Camouflage works and why it’s important for keeping your applications secure. To learn more about CA authentication solutions, go to: http://www.ca.com/us/multifactor-authentication source

Hiding your images in style since 1994. Copyright Protection Scheme for Digital Images Using Visual Cryptography and Sampling Methods Ching-Sheng Hsu Young-Chang Hou July 2005 RIT, IMGS-362 Image Processing & Computer Vision II source

Duke University research scholar Nicholas Gessler has created a collection of cryptographic devices used by intelligence officers from the seventeenth century up through World War II. He says studying the devices offers clues about historical events, technological trends and social relations. Read more here: http://today.duke.edu/2014/03/gessler. source