Noiseless steganography : the key to covert communications / Abdelrahman Desoky.

"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the c...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Taylor & Francis)
Main Author: Desoky, Abdelrahman
Format: eBook
Language:English
Published: Boca Raton : Auerbach Publications, 2012.
Subjects:
Table of Contents:
  • Introduction; Steganography: Definition, Current State,
  • And Concerns; Noiseless Steganography (Nostega) Paradigm; Summary of the Contributions; Book Outline; Conclusion; ; Related Work; Text Steganography; Non-Textual Steganography; ; Graphstega: Graph Steganography Methodology; Graphstega Methodology; Other Steganographic Cover Types; Communications Protocol; Conclusion; ; Chestega: Chess Steganography Methodology; Chestega Methodology; Chestega Implementation; Conclusion; ; Edustega: Education-Centric Steganography Methodology; Edustega Methodology; Edustega Implementation; Conclusion; ; Sumstega: Summarization-Based Steganography Methodology; Automatic Summarization Overview; Sumstega Carriers; Sumstega Methodology; Conclusion; ; Matlist: Mature Linguistic Steganography Methodology; Introduction; Matlist Methodology; Matlist.
  • Implementation; Conclusion NORMALS: Normal Linguistic Steganography Methodology; NORMALS Methodology; NORMALS Implementation; Performance; Conclusion Headstega: Steganography Methodology; Headstega Methodology; Headstega Implementation; Conclusion Jokestega: Automatic Joke Generation Based Steganography Methodology; Automatic Joke Generation; Jokestega Methodology; Jokestega Implementation; Conclusion Listega: Steganography Methodology; Listega Methodology; Listega Implementation; Conclusion; ; Notestega: Steganography Methodology; Automatic Note Taking; Notestega Methodology; Notestega Implementation; Conclusion Steganalysis Validation; Traffic Attack; Contrast and Comparison Attacks; Linguistics Attacks; Statistical Signature; Conclusion Conclusion and.
  • Future Work; Contributions; Bitrate; Final Conclusion and Future Work Bibliography Index; ;