Noiseless steganography: the key to covert communications

IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Beteilige Person: Desoky, Abdelrahman (VerfasserIn)
Körperschaft: ProQuest (Firm) (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Boca Raton, FL CRC Press c2012
Schlagwörter:
Links:https://learning.oreilly.com/library/view/-/9781439846223/?ar
Zusammenfassung:IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex.
Beschreibung:Includes bibliographical references
Umfang:1 Online-Ressource (xix, 276 Seiten) ill.
ISBN:9781439846223
1439846227
9781138199361
1138199362