Noiseless steganography the key to covert communications

IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic...

Full description

Bibliographic Details
Main Author: Desoky, Abdelrahman
Format: eBook
Language:English
Published: Boca Raton, FL CRC Press 2012
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04344nmm a2200517 u 4500
001 EB001937063
003 EBX01000000000000001099965
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781439846223 
020 |a 1439846227 
020 |a 9781138199361 
050 4 |a QA268 
100 1 |a Desoky, Abdelrahman 
245 0 0 |a Noiseless steganography  |h [electronic resource]  |b the key to covert communications  |c Abdelrahman Desoky 
260 |a Boca Raton, FL  |b CRC Press  |c 2012 
300 |a xix, 276 p.  |b ill 
505 0 |a Front Cover -- Dedication -- Contents -- Foreword -- Acknowledgments -- About the Author -- Chapter 1: Introduction -- Chapter 2: Related Work -- Chapter 3: Graphstega: Graph Steganography Methodology -- Chapter 4: Chestega: Chess Steganography Methodology -- Chapter 5: Edustega: Education-Centric Steganography Methodology -- Chapter 6: Sumstega: Summarization-Based Steganography Methodology -- Chapter 7: Matlist: Mature Linguistic Steganography Methodology -- Chapter 8: NORMALS: Normal Linguistic Steganography Methodology -- Chapter 9: Headstega: E-Mail-Headers-Based Steganography Methodology -- Chapter 10: Jokestega: Automatic Joke Generation-Based Steganography Methodology -- Chapter 11: Listega: List-Based Steganography Methodology -- Chapter 12: Notestega: Notes-Based Steganography Methodology -- Chapter 13: Steganalysis Validation -- Chapter 14: Conclusion and Future Work -- Bibliography -- Back Cover 
505 0 |a Includes bibliographical references 
653 |a Électronique dans l'espionnage 
653 |a Data encryption (Computer science) / fast 
653 |a Chiffrement (Informatique) 
653 |a Secret professionnel 
653 |a Data transmission systems / http://id.loc.gov/authorities/subjects/sh85035869 
653 |a Coding theory / http://id.loc.gov/authorities/subjects/sh85027654 
653 |a Electronics in espionage / http://id.loc.gov/authorities/subjects/sh85042402 
653 |a Confidential communications / fast 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a Coding theory / fast 
653 |a Electronics in espionage / fast 
653 |a Data transmission systems / fast 
653 |a Confidential communications / http://id.loc.gov/authorities/subjects/sh85030929 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBB1B6364 
776 |z 9781138199361 
776 |z 9781439846223 
776 |z 9781439846216 
776 |z 1439846219 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439846223/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 500 
082 0 |a 621.381 
082 0 |a 003/.54 
520 |a IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex