Noiseless steganography : (Record no. 81948)

000 -LEADER
fixed length control field 03275cam a22004214a 4500
001 - CONTROL NUMBER
control field 17081179
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230405144816.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111212s2012 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011046670
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB1B6364
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015904075
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439846216 (hardback)
International Standard Book Number 1439846219 (hardback)
International Standard Book Number 9780367829841
International Standard Book Number 9780367899486 (set)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn756281866
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- UKMGB
-- YDXCP
-- BWX
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
Item number .D47 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.54
Item number DES-N
084 ## - OTHER CLASSIFICATION NUMBER
Classification number BUS041000
-- COM053000
-- COM083000
Number source bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Desoky, Abdelrahman.
Relator term Author
9 (RLIN) 32138
245 10 - TITLE STATEMENT
Title Noiseless steganography :
Remainder of title the key to covert communications /
Statement of responsibility, etc. Abdelrahman Desoky.
250 ## - EDITION STATEMENT
Edition statement Library Edition: Cryptography
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton, FL :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 282 p. :
Other physical details ill. ;
Dimensions 24 cm.
520 ## - SUMMARY, ETC.
Summary, etc. "Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory.
9 (RLIN) 468
Topical term or geographic name as entry element Data transmission systems.
9 (RLIN) 9254
Topical term or geographic name as entry element Electronics in espionage.
9 (RLIN) 32139
Topical term or geographic name as entry element Confidential communications.
9 (RLIN) 32140
Topical term or geographic name as entry element Data encryption (Computer science)
9 (RLIN) 466
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 265-276) and index.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Reference
Edition Library Edition: Cryptography
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type
        Not For Loan Reference RGU Central Library RGU Central Library Reference 2023-04-05 003.54 DES-N 80140 2023-04-05 2023-04-05 Reference

Powered by Koha