|
|
|
|
LEADER |
04344nmm a2200517 u 4500 |
001 |
EB001937063 |
003 |
EBX01000000000000001099965 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781439846223
|
020 |
|
|
|a 1439846227
|
020 |
|
|
|a 9781138199361
|
050 |
|
4 |
|a QA268
|
100 |
1 |
|
|a Desoky, Abdelrahman
|
245 |
0 |
0 |
|a Noiseless steganography
|h [electronic resource]
|b the key to covert communications
|c Abdelrahman Desoky
|
260 |
|
|
|a Boca Raton, FL
|b CRC Press
|c 2012
|
300 |
|
|
|a xix, 276 p.
|b ill
|
505 |
0 |
|
|a Front Cover -- Dedication -- Contents -- Foreword -- Acknowledgments -- About the Author -- Chapter 1: Introduction -- Chapter 2: Related Work -- Chapter 3: Graphstega: Graph Steganography Methodology -- Chapter 4: Chestega: Chess Steganography Methodology -- Chapter 5: Edustega: Education-Centric Steganography Methodology -- Chapter 6: Sumstega: Summarization-Based Steganography Methodology -- Chapter 7: Matlist: Mature Linguistic Steganography Methodology -- Chapter 8: NORMALS: Normal Linguistic Steganography Methodology -- Chapter 9: Headstega: E-Mail-Headers-Based Steganography Methodology -- Chapter 10: Jokestega: Automatic Joke Generation-Based Steganography Methodology -- Chapter 11: Listega: List-Based Steganography Methodology -- Chapter 12: Notestega: Notes-Based Steganography Methodology -- Chapter 13: Steganalysis Validation -- Chapter 14: Conclusion and Future Work -- Bibliography -- Back Cover
|
505 |
0 |
|
|a Includes bibliographical references
|
653 |
|
|
|a Électronique dans l'espionnage
|
653 |
|
|
|a Data encryption (Computer science) / fast
|
653 |
|
|
|a Chiffrement (Informatique)
|
653 |
|
|
|a Secret professionnel
|
653 |
|
|
|a Data transmission systems / http://id.loc.gov/authorities/subjects/sh85035869
|
653 |
|
|
|a Coding theory / http://id.loc.gov/authorities/subjects/sh85027654
|
653 |
|
|
|a Electronics in espionage / http://id.loc.gov/authorities/subjects/sh85042402
|
653 |
|
|
|a Confidential communications / fast
|
653 |
|
|
|a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524
|
653 |
|
|
|a Coding theory / fast
|
653 |
|
|
|a Electronics in espionage / fast
|
653 |
|
|
|a Data transmission systems / fast
|
653 |
|
|
|a Confidential communications / http://id.loc.gov/authorities/subjects/sh85030929
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
015 |
|
|
|a GBB1B6364
|
776 |
|
|
|z 9781138199361
|
776 |
|
|
|z 9781439846223
|
776 |
|
|
|z 9781439846216
|
776 |
|
|
|z 1439846219
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439846223/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 621.381
|
082 |
0 |
|
|a 003/.54
|
520 |
|
|
|a IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex
|