22:
184:, "detection" means converting a received optical input to an electrical output. For example, the light signal received through an
203:. Steganalysis has an interesting difference from most other types of detection, in that it can often only determine the
94:
66:
113:
51:
73:
47:
149:. The term is still in use today to describe a component that extracts a particular signal from all of the
80:
237:
in attempting to reconstruct a sequence of events by identifying the relevant information in a situation.
271:
43:
62:
150:
32:
251:
36:
266:
207:
that a hidden message exists; this is in contrast to the detection of signals which are simply
142:
130:
is the action of accessing information without specific cooperation from with the sender.
8:
162:
87:
141:" was first used for a device that detected the simple presence or absence of a radio
199:, attempts to detect hidden signals in suspected carrier material is referred to as
246:
138:
181:
170:
226:
with the aim to recognize the presence of an object in a location or ambiance.
223:
158:
260:
196:
185:
174:
200:
204:
215:
can often be identified with certainty, even if it cannot be decoded.
212:
208:
189:
146:
234:
154:
21:
219:
188:
is converted to an electrical signal in a detector such as a
166:
134:
165:, but it may also involve filtering a faint signal from
258:
222:, detection refers to the special discipline of
229:Finally, the art of detection, also known as
153:present. Detection is usually based on the
173:, or reconstructing a hidden signal, as in
50:. Unsourced material may be challenged and
114:Learn how and when to remove this message
259:
161:, as in the familiar frequencies of
48:adding citations to reliable sources
15:
145:, since all communications were in
13:
14:
283:
20:
1:
7:
240:
10:
288:
137:communications, the term "
252:Signal detection theory
151:electromagnetic waves
44:improve this article
233:, is the work of a
163:radio broadcasting
133:In the history of
272:Wireless locating
124:
123:
116:
98:
279:
247:Object detection
119:
112:
108:
105:
99:
97:
56:
24:
16:
287:
286:
282:
281:
280:
278:
277:
276:
257:
256:
243:
231:following clues
182:optoelectronics
171:radio astronomy
120:
109:
103:
100:
57:
55:
41:
25:
12:
11:
5:
285:
275:
274:
269:
255:
254:
249:
242:
239:
224:reconnaissance
159:carrier signal
122:
121:
28:
26:
19:
9:
6:
4:
3:
2:
284:
273:
270:
268:
267:Communication
265:
264:
262:
253:
250:
248:
245:
244:
238:
236:
232:
227:
225:
221:
216:
214:
210:
206:
202:
198:
197:steganography
193:
191:
187:
186:optical fiber
183:
178:
176:
175:steganography
172:
168:
164:
160:
156:
152:
148:
144:
140:
136:
131:
129:
118:
115:
107:
96:
93:
89:
86:
82:
79:
75:
72:
68:
65: –
64:
60:
59:Find sources:
53:
49:
45:
39:
38:
34:
29:This article
27:
23:
18:
17:
230:
228:
217:
201:steganalysis
194:
179:
132:
127:
126:In general,
125:
110:
101:
91:
84:
77:
70:
58:
42:Please help
30:
205:probability
63:"Detection"
261:Categories
213:ciphertext
190:photodiode
147:Morse code
104:March 2018
74:newspapers
235:detective
211:, as the
209:encrypted
155:frequency
128:detection
31:does not
241:See also
220:military
169:, as in
139:detector
218:In the
157:of the
88:scholar
52:removed
37:sources
143:signal
90:
83:
76:
69:
61:
167:noise
135:radio
95:JSTOR
81:books
67:news
35:any
33:cite
195:In
180:In
46:by
263::
192:.
177:.
117:)
111:(
106:)
102:(
92:·
85:·
78:·
71:·
54:.
40:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.