000 03275cam a22004214a 4500
999 _c81948
_d81948
001 17081179
003 OSt
005 20230405144816.0
008 111212s2012 flua b 001 0 eng
010 _a 2011046670
015 _aGBB1B6364
_2bnb
016 7 _a015904075
_2Uk
020 _a9781439846216 (hardback)
020 _a1439846219 (hardback)
020 _a9780367829841
020 _a9780367899486 (set)
035 _a(OCoLC)ocn756281866
040 _aDLC
_beng
_cDLC
_dYDX
_dBTCTA
_dUKMGB
_dYDXCP
_dBWX
_dDLC
042 _apcc
050 0 0 _aQA268
_b.D47 2012
082 0 0 _a003.54
_bDES-N
084 _aBUS041000
_aCOM053000
_aCOM083000
_2bisacsh
100 1 _aDesoky, Abdelrahman.
_eaut
_932138
245 1 0 _aNoiseless steganography :
_bthe key to covert communications /
_cAbdelrahman Desoky.
250 _aLibrary Edition: Cryptography
260 _aBoca Raton, FL :
_bCRC Press,
_cc2012.
300 _axix, 282 p. :
_bill. ;
_c24 cm.
520 _a"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher.
650 0 _aCoding theory.
_9468
650 0 _aData transmission systems.
_99254
650 0 _aElectronics in espionage.
_932139
650 0 _aConfidential communications.
_932140
650 0 _aData encryption (Computer science)
_9466
504 _aIncludes bibliographical references (p. 265-276) and index.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cREF
_eLibrary Edition: Cryptography