Skip to content

Noiseless Steganography The Key to Covert Communications

Best in textbook rentals since 2012!

ISBN-10: 1439846219

ISBN-13: 9781439846216

Edition: 2012

Authors: Abdelrahman Desoky

Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This book introduces a novel Noiseless Steganography Paradigm (Nostega) that neither hides data in a noise nor produces noise; instead, it camouflages messages in a form of unquestionable data in the generated cover. The text presents several methodologies. The first is a novel cover type, while the second pursues popular games such as chess to conceal messages. The third methodology pursues the linguistics path to generate text-cover. The final methodology is also a linguistic steganography type that conceals messages by manipulating automatic summarization techniques to conceal data in textual summaries. The author discusses implementation and steganalysis validation of these…    
Customers also bought

Book details

Copyright year: 2012
Publisher: Taylor & Francis Group
Publication date: 2/29/2012
Binding: Hardcover
Pages: 300
Size: 6.00" wide x 9.00" long x 0.75" tall
Weight: 1.210
Language: English

Abdelrahman Desoky currently works as an Independent Consultant.

Foreword
Acknowledgments
About the Author
Introduction
Steganography: Definition, Current State, and Concerns
Noiseless Steganography (Nostega) Paradigm
The Architecture of Nostega
Advantages of Nostega
Summary of the Contributions
Book Outline
Related Work
Textual Steganography
Textual Format Manipulation (TFM)
Series of Characters and Words
Statistical Based
Synonym Based
Noise Based
Non-Textual Steganography
Graphstega: Graph Steganography Methodology
Graphstega Methodology
Message Encoding
Graph Cover
Other Steganographic Cover Types
Graph in Image Cover
Presenting the Graph's Data in Text Cover
Presenting the Graph's Data in Audio Cover
Communications Protocol
Conclusion
Chestega: Chess Steganography Methodology
Chestega Methodology
Chestega Overview
Determining Encoding Parameters
Defining Message Encoder
Message Camouflaging Scheme
Chestega Configuration
Chestega Implementation
Chessboard-based Example
Non-game Example
Conclusion
Edustega: Education-Centric Steganography Methodology
Edustega Methodology
Edustega Overview
Establishing Covert Channel
Message Encoding
Message Camouflaging
Edustega Implementation
Edustega System
Edustega Examples
Bitrate
Conclusion
Sumstega: Summarization-Based Steganography Methodology
Automatic Summarization Overview
Sumstega Carriers
Extraction
Abstraction
Multi-document
Cross-lingual
Sumstega Methodology
Sumstega Overview
Sumstega Architecture
Sumstega Encoder
Sumstega Camouflager
Implementation Example
Sample of Sumstega Cover
Sumstega Communications Protocol
Bitrate
Conclusion
Matlist: Mature Linguistic Steganography Methodology
Introduction
Natural Language Generation and Template
Matlist Versus Previous Work
Matlist Methodology
Matlist Architecture Overview
DSS Determination
DSS Specifications
Building Matlist Encoder
Building Matlist NLG or Template System
Implementing Matlist Communications Protocol
Matlist Implementation
DSS of Consumer Price Index
First Implementation Example of CPI
Second Implementation Example of CPI
Text Substitution
Third Implementation Example of CPI
Other DSS
DSS of Elementary Math
DSS of Selling Books
DSS of Chemistry
DSS of Discrete Math
Matlist Bitrate
Conclusion
Normals: Normal Linguistic Steganography Methodology
Normals Methodology
Normals Overview
Normals NLGS
Normals Encoder
NLGS Inputs
Normals Communications Protocol
Normals Implementation
Determining Normals NLGS
Determining Normals Encoder
Normals Cover
Determining Normals Communications Protocol
Performance
Conclusion
Headstega: Steganography Methodology
Headstega Methodology
Headstega Overview
Message Encoding
Message Camouflager
Headstega Implementation
Headstega Configuration
Headstega Example
Sample Head Cover
Bitrate
Conclusion
Jokestega: Automatic Joke Generation-Based Steganography Methodology
Automatic Joke Generation Systems
Jokestega Methodology
Automatic Jokes Generator System
Message Encoder
Camouflager
Establishing Covert Channel
Jokestega Implementation
Jokestega System
Joke Cover Example
Jokestega Performance
Conclusion
Listega: Steganography Methodology
Listega Methodology
Listega Architecture
Domain Determination
Message Encoding
Message Camouflager
Communications Protocol
Listega Implementation
Listega Configuration
Listega Examples
Conclusion
Notestega: Steganography Methodology
Automatic Note Taking
Notestega Methodology
Notestega Architecture
Topic(s) Determination
Message Encoding
Message Camouflager
Notestega Implementation
Notestega Configuration
Samples of Note Cover
Conclusion
Steganalysis Validation
Traffic Attack
Contrast and Comparison Attacks
Linguistics Attacks
Statistical Signature
Zipfian Signature
Letter Frequency Distribution
Kullback-Leibler Divergence
Conclusion
Conclusion and Future Work
Contributions
Bitrate
Final Conclusion and Future Work
Bibliography
Index