Cover image for Noiseless steganography the key to covert communications
Title:
Noiseless steganography the key to covert communications
Author:
Desoky, Abdelrahman.
ISBN:
9781439846223
Publication Information:
Boca Raton : CRC Press, 2012.
Physical Description:
xix, 282 p. : ill.
Contents:
ch. 1. Introduction -- ch. 2. Related work -- ch. 3. Graphstega : graph steganography methodology -- ch. 4. Chestega : chess steganography methodology -- ch. 5. Edustega : education-centric steganography methodology -- ch. 6. Sumstega : summarization-based steganography methodology -- ch. 7. Matlist : mature linguistic steganography methodology -- ch. 8. NORMALS : normal linguistic steganography methodology -- ch. 9. Headstega : steganography methodology -- ch. 10. Jokestega : automatic joke generation-based steganography methodology -- ch. 11. Listega : steganography methodology -- ch. 12. Notestega : steganography methodology -- ch. 13. Steganalysis validation -- ch. 14. Conclusion and future work.
Abstract:
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"-- Provided by publisher.
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 285243-1001 ONLINE
Searching...

On Order