Noiseless steganography: the key to covert communications
IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
c2012
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781439846223/?ar |
Zusammenfassung: | IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex. |
Beschreibung: | Includes bibliographical references |
Umfang: | 1 Online-Ressource (xix, 276 Seiten) ill. |
ISBN: | 9781439846223 1439846227 9781138199361 1138199362 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051697785 | ||
003 | DE-627-1 | ||
005 | 20240228114957.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781439846223 |c e-book : PDF |9 978-1-4398-4622-3 | ||
020 | |a 1439846227 |9 1-4398-4622-7 | ||
020 | |a 9781138199361 |c paperback |9 978-1-138-19936-1 | ||
020 | |a 1138199362 |9 1-138-19936-2 | ||
035 | |a (DE-627-1)051697785 | ||
035 | |a (DE-599)KEP051697785 | ||
035 | |a (ORHE)9781439846223 | ||
035 | |a (DE-627-1)051697785 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 003/.54 | |
100 | 1 | |a Desoky, Abdelrahman |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Noiseless steganography |b the key to covert communications |c Abdelrahman Desoky |
264 | 1 | |a Boca Raton, FL |b CRC Press |c c2012 | |
300 | |a 1 Online-Ressource (xix, 276 Seiten) |b ill. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex. | ||
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Confidential communications | |
650 | 0 | |a Electronics in espionage | |
650 | 0 | |a Data transmission systems | |
650 | 0 | |a Coding theory | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Secret professionnel | |
650 | 4 | |a Électronique dans l'espionnage | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Confidential communications | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Data transmission systems | |
650 | 4 | |a Electronics in espionage | |
710 | 2 | |a ProQuest (Firm) |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781439846223/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051697785 |
---|---|
_version_ | 1821494841831325696 |
adam_text | |
any_adam_object | |
author | Desoky, Abdelrahman |
author_corporate | ProQuest (Firm) |
author_corporate_role | ctb |
author_facet | Desoky, Abdelrahman ProQuest (Firm) |
author_role | aut |
author_sort | Desoky, Abdelrahman |
author_variant | a d ad |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051697785 (DE-599)KEP051697785 (ORHE)9781439846223 |
dewey-full | 003/.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003/.54 |
dewey-search | 003/.54 |
dewey-sort | 13 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03413cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-051697785</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114957.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439846223</subfield><subfield code="c">e-book : PDF</subfield><subfield code="9">978-1-4398-4622-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439846227</subfield><subfield code="9">1-4398-4622-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138199361</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-138-19936-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1138199362</subfield><subfield code="9">1-138-19936-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051697785</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051697785</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781439846223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051697785</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003/.54</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Desoky, Abdelrahman</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Noiseless steganography</subfield><subfield code="b">the key to covert communications</subfield><subfield code="c">Abdelrahman Desoky</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 276 Seiten)</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronics in espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secret professionnel</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Électronique dans l'espionnage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics in espionage</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781439846223/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051697785 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:48Z |
institution | BVB |
isbn | 9781439846223 1439846227 9781138199361 1138199362 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xix, 276 Seiten) ill. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | CRC Press |
record_format | marc |
spelling | Desoky, Abdelrahman VerfasserIn aut Noiseless steganography the key to covert communications Abdelrahman Desoky Boca Raton, FL CRC Press c2012 1 Online-Ressource (xix, 276 Seiten) ill. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex. Data encryption (Computer science) Confidential communications Electronics in espionage Data transmission systems Coding theory Chiffrement (Informatique) Secret professionnel Électronique dans l'espionnage ProQuest (Firm) MitwirkendeR ctb |
spellingShingle | Desoky, Abdelrahman Noiseless steganography the key to covert communications Data encryption (Computer science) Confidential communications Electronics in espionage Data transmission systems Coding theory Chiffrement (Informatique) Secret professionnel Électronique dans l'espionnage |
title | Noiseless steganography the key to covert communications |
title_auth | Noiseless steganography the key to covert communications |
title_exact_search | Noiseless steganography the key to covert communications |
title_full | Noiseless steganography the key to covert communications Abdelrahman Desoky |
title_fullStr | Noiseless steganography the key to covert communications Abdelrahman Desoky |
title_full_unstemmed | Noiseless steganography the key to covert communications Abdelrahman Desoky |
title_short | Noiseless steganography |
title_sort | noiseless steganography the key to covert communications |
title_sub | the key to covert communications |
topic | Data encryption (Computer science) Confidential communications Electronics in espionage Data transmission systems Coding theory Chiffrement (Informatique) Secret professionnel Électronique dans l'espionnage |
topic_facet | Data encryption (Computer science) Confidential communications Electronics in espionage Data transmission systems Coding theory Chiffrement (Informatique) Secret professionnel Électronique dans l'espionnage |
work_keys_str_mv | AT desokyabdelrahman noiselesssteganographythekeytocovertcommunications AT proquestfirm noiselesssteganographythekeytocovertcommunications |