Noiseless steganography : the key to covert communications /: the key to covert communications. (2012)
- Record Type:
- Book
- Title:
- Noiseless steganography : the key to covert communications /: the key to covert communications. (2012)
- Main Title:
- Noiseless steganography : the key to covert communications
- Further Information:
- Note: Abdelrahman Desoky.
- Other Names:
- Desoky, Abdelrahman
- Contents:
- Introduction; Steganography: Definition, Current State, and Concerns; Noiseless Steganography (Nostega) Paradigm; Summary of the Contributions; Book Outline; Conclusion; ; Related Work; Text Steganography; Non-Textual Steganography; ; Graphstega: Graph Steganography Methodology; Graphstega Methodology; Other Steganographic Cover Types; Communications Protocol; Conclusion; ; Chestega: Chess Steganography Methodology; Chestega Methodology; Chestega Implementation; Conclusion; ; Edustega: Education-Centric Steganography Methodology; Edustega Methodology; Edustega Implementation; Conclusion; ; Sumstega: Summarization-Based Steganography Methodology; Automatic Summarization Overview; Sumstega Carriers; Sumstega Methodology; Conclusion; ; Matlist: Mature Linguistic Steganography Methodology; Introduction; Matlist Methodology; Matlist Implementation; Conclusion NORMALS: Normal Linguistic Steganography Methodology; NORMALS Methodology; NORMALS Implementation; Performance; Conclusion Headstega: Steganography Methodology; Headstega Methodology; Headstega Implementation; Conclusion Jokestega: Automatic Joke Generation Based Steganography Methodology; Automatic Joke Generation; Jokestega Methodology; Jokestega Implementation; Conclusion Listega: Steganography Methodology; Listega Methodology; Listega Implementation; Conclusion; ; Notestega: Steganography Methodology; Automatic Note Taking; Notestega Methodology; Notestega Implementation; Conclusion Steganalysis Validation; TrafficIntroduction; Steganography: Definition, Current State, and Concerns; Noiseless Steganography (Nostega) Paradigm; Summary of the Contributions; Book Outline; Conclusion; ; Related Work; Text Steganography; Non-Textual Steganography; ; Graphstega: Graph Steganography Methodology; Graphstega Methodology; Other Steganographic Cover Types; Communications Protocol; Conclusion; ; Chestega: Chess Steganography Methodology; Chestega Methodology; Chestega Implementation; Conclusion; ; Edustega: Education-Centric Steganography Methodology; Edustega Methodology; Edustega Implementation; Conclusion; ; Sumstega: Summarization-Based Steganography Methodology; Automatic Summarization Overview; Sumstega Carriers; Sumstega Methodology; Conclusion; ; Matlist: Mature Linguistic Steganography Methodology; Introduction; Matlist Methodology; Matlist Implementation; Conclusion NORMALS: Normal Linguistic Steganography Methodology; NORMALS Methodology; NORMALS Implementation; Performance; Conclusion Headstega: Steganography Methodology; Headstega Methodology; Headstega Implementation; Conclusion Jokestega: Automatic Joke Generation Based Steganography Methodology; Automatic Joke Generation; Jokestega Methodology; Jokestega Implementation; Conclusion Listega: Steganography Methodology; Listega Methodology; Listega Implementation; Conclusion; ; Notestega: Steganography Methodology; Automatic Note Taking; Notestega Methodology; Notestega Implementation; Conclusion Steganalysis Validation; Traffic Attack; Contrast and Comparison Attacks; Linguistics Attacks; Statistical Signature; Conclusion Conclusion and Future Work; Contributions; Bitrate; Final Conclusion and Future Work Bibliography Index; ; ; ; … (more)
- Publisher Details:
- Place of publication not identified : Auerbach Publications
- Publication Date:
- 2012
- Extent:
- 1 online resource, illustrations
- Subjects:
- 003.54
Coding theory
Data transmission systems
Electronics in espionage
Confidential communications
Data encryption (Computer science) - Languages:
- English
- ISBNs:
- 9781466559110
- Related ISBNs:
- 146655911X
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143508
- Ingest File:
- 02_108.xml