Noiseless steganography : the key to covert communications / Abdelrahman Desoky.
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the c...
Saved in:
Online Access: |
Full Text (via Taylor & Francis) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Boca Raton :
Auerbach Publications,
2012.
|
Subjects: |
Table of Contents:
- Introduction; Steganography: Definition, Current State,
- And Concerns; Noiseless Steganography (Nostega) Paradigm; Summary of the Contributions; Book Outline; Conclusion; ; Related Work; Text Steganography; Non-Textual Steganography; ; Graphstega: Graph Steganography Methodology; Graphstega Methodology; Other Steganographic Cover Types; Communications Protocol; Conclusion; ; Chestega: Chess Steganography Methodology; Chestega Methodology; Chestega Implementation; Conclusion; ; Edustega: Education-Centric Steganography Methodology; Edustega Methodology; Edustega Implementation; Conclusion; ; Sumstega: Summarization-Based Steganography Methodology; Automatic Summarization Overview; Sumstega Carriers; Sumstega Methodology; Conclusion; ; Matlist: Mature Linguistic Steganography Methodology; Introduction; Matlist Methodology; Matlist.
- Implementation; Conclusion NORMALS: Normal Linguistic Steganography Methodology; NORMALS Methodology; NORMALS Implementation; Performance; Conclusion Headstega: Steganography Methodology; Headstega Methodology; Headstega Implementation; Conclusion Jokestega: Automatic Joke Generation Based Steganography Methodology; Automatic Joke Generation; Jokestega Methodology; Jokestega Implementation; Conclusion Listega: Steganography Methodology; Listega Methodology; Listega Implementation; Conclusion; ; Notestega: Steganography Methodology; Automatic Note Taking; Notestega Methodology; Notestega Implementation; Conclusion Steganalysis Validation; Traffic Attack; Contrast and Comparison Attacks; Linguistics Attacks; Statistical Signature; Conclusion Conclusion and.
- Future Work; Contributions; Bitrate; Final Conclusion and Future Work Bibliography Index; ;