Noiseless steganography the key to covert communications /
IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press,
c2012.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Sumario: | IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex. |
---|---|
Descripción Física: | 1 online resource (xix, 276 p.) : ill. |
Bibliografía: | Includes bibliographical references. |
ISBN: | 9781439846223 1439846227 9781138199361 1138199362 |