000 -LEADER |
fixed length control field |
03275cam a22004214a 4500 |
001 - CONTROL NUMBER |
control field |
17081179 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230405144816.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
111212s2012 flua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011046670 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBB1B6364 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015904075 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781439846216 (hardback) |
|
International Standard Book Number |
1439846219 (hardback) |
|
International Standard Book Number |
9780367829841 |
|
International Standard Book Number |
9780367899486 (set) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn756281866 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
YDX |
-- |
BTCTA |
-- |
UKMGB |
-- |
YDXCP |
-- |
BWX |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA268 |
Item number |
.D47 2012 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
003.54 |
Item number |
DES-N |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
BUS041000 |
-- |
COM053000 |
-- |
COM083000 |
Number source |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Desoky, Abdelrahman. |
Relator term |
Author |
9 (RLIN) |
32138 |
245 10 - TITLE STATEMENT |
Title |
Noiseless steganography : |
Remainder of title |
the key to covert communications / |
Statement of responsibility, etc. |
Abdelrahman Desoky. |
250 ## - EDITION STATEMENT |
Edition statement |
Library Edition: Cryptography |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
c2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 282 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Coding theory. |
9 (RLIN) |
468 |
|
Topical term or geographic name as entry element |
Data transmission systems. |
9 (RLIN) |
9254 |
|
Topical term or geographic name as entry element |
Electronics in espionage. |
9 (RLIN) |
32139 |
|
Topical term or geographic name as entry element |
Confidential communications. |
9 (RLIN) |
32140 |
|
Topical term or geographic name as entry element |
Data encryption (Computer science) |
9 (RLIN) |
466 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (p. 265-276) and index. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Reference |
Edition |
Library Edition: Cryptography |