Noiseless steganography the key to covert communications
by
 
Desoky, Abdelrahman.

Title
Noiseless steganography the key to covert communications

Author
Desoky, Abdelrahman.

ISBN
9781439846223

Publication Information
Boca Raton : CRC Press, 2012.

Physical Description
xix, 282 p. : ill.

Contents
ch. 1. Introduction -- ch. 2. Related work -- ch. 3. Graphstega : graph steganography methodology -- ch. 4. Chestega : chess steganography methodology -- ch. 5. Edustega : education-centric steganography methodology -- ch. 6. Sumstega : summarization-based steganography methodology -- ch. 7. Matlist : mature linguistic steganography methodology -- ch. 8. NORMALS : normal linguistic steganography methodology -- ch. 9. Headstega : steganography methodology -- ch. 10. Jokestega : automatic joke generation-based steganography methodology -- ch. 11. Listega : steganography methodology -- ch. 12. Notestega : steganography methodology -- ch. 13. Steganalysis validation -- ch. 14. Conclusion and future work.

Abstract
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"-- Provided by publisher.

Subject Term
Coding theory.
 
Data transmission systems.
 
Electronics in espionage.
 
Confidential communications.
 
Data encryption (Computer science)

Electronic Access
Distributed by publisher. Purchase or institutional license may be required for access.


LibraryMaterial TypeItem BarcodeShelf Number[[missing key: search.ChildField.HOLDING]]Status
Online LibraryE-Book285243-1001ONLINEElektronik Kütüphane