000 | 03275cam a22004214a 4500 | ||
---|---|---|---|
999 |
_c81948 _d81948 |
||
001 | 17081179 | ||
003 | OSt | ||
005 | 20230405144816.0 | ||
008 | 111212s2012 flua b 001 0 eng | ||
010 | _a 2011046670 | ||
015 |
_aGBB1B6364 _2bnb |
||
016 | 7 |
_a015904075 _2Uk |
|
020 | _a9781439846216 (hardback) | ||
020 | _a1439846219 (hardback) | ||
020 | _a9780367829841 | ||
020 | _a9780367899486 (set) | ||
035 | _a(OCoLC)ocn756281866 | ||
040 |
_aDLC _beng _cDLC _dYDX _dBTCTA _dUKMGB _dYDXCP _dBWX _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA268 _b.D47 2012 |
082 | 0 | 0 |
_a003.54 _bDES-N |
084 |
_aBUS041000 _aCOM053000 _aCOM083000 _2bisacsh |
||
100 | 1 |
_aDesoky, Abdelrahman. _eaut _932138 |
|
245 | 1 | 0 |
_aNoiseless steganography : _bthe key to covert communications / _cAbdelrahman Desoky. |
250 | _aLibrary Edition: Cryptography | ||
260 |
_aBoca Raton, FL : _bCRC Press, _cc2012. |
||
300 |
_axix, 282 p. : _bill. ; _c24 cm. |
||
520 | _a"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher. | ||
650 | 0 |
_aCoding theory. _9468 |
|
650 | 0 |
_aData transmission systems. _99254 |
|
650 | 0 |
_aElectronics in espionage. _932139 |
|
650 | 0 |
_aConfidential communications. _932140 |
|
650 | 0 |
_aData encryption (Computer science) _9466 |
|
504 | _aIncludes bibliographical references (p. 265-276) and index. | ||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cREF _eLibrary Edition: Cryptography |