Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Noiseless steganography : = the key ...
~
Desoky, Abdelrahman.
Noiseless steganography : = the key to covert communications /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Noiseless steganography :/ Abdelrahman Desoky.
Reminder of title:
the key to covert communications /
Author:
Desoky, Abdelrahman.
Published:
Boca Raton, FL :CRC Press, : c2012.,
Description:
xix, 282 p. :ill. ; : 24 cm.;
Subject:
Data encryption (Computer science) -
ISBN:
9781439846216 (cloth) :
Noiseless steganography : = the key to covert communications /
Desoky, Abdelrahman.
Noiseless steganography :
the key to covert communications /Abdelrahman Desoky. - Boca Raton, FL :CRC Press,c2012. - xix, 282 p. :ill. ;24 cm.
Includes bibliographical references (p. 265-276) and index.
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher.
ISBN: 9781439846216 (cloth) :NT3634
LCCN: 2011046670
Nat. Bib. No.: GBB1B6364bnb
Nat. Bib. Agency Control No.: 015904075UkSubjects--Topical Terms:
658943
Data encryption (Computer science)
LC Class. No.: QA268 / .D47 2012
Dewey Class. No.: 003/.54
Noiseless steganography : = the key to covert communications /
LDR
:02635cam a22002654a 4500
001
715228
003
DLC
005
20120718095112.0
008
121122s2012 flua b 001 0 eng
010
$a
2011046670
015
$a
GBB1B6364
$2
bnb
016
7
$a
015904075
$2
Uk
020
$a
9781439846216 (cloth) :
$c
NT3634
020
$a
1439846219 (cloth)
035
$a
(OCoLC)ocn756281866
035
$a
2011046670
040
$a
DLC
$b
eng
$c
DLC
$d
YDX
$d
BTCTA
$d
UKMGB
$d
YDXCP
$d
BWX
$d
DLC
$d
NFU
042
$a
pcc
050
0 0
$a
QA268
$b
.D47 2012
082
0 0
$a
003/.54
$2
23
084
$a
BUS041000
$a
COM053000
$a
COM083000
$2
bisacsh
100
1
$a
Desoky, Abdelrahman.
$3
848848
245
1 0
$a
Noiseless steganography :
$b
the key to covert communications /
$c
Abdelrahman Desoky.
260
$a
Boca Raton, FL :
$c
c2012.
$b
CRC Press,
300
$a
xix, 282 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references (p. 265-276) and index.
520
$a
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher.
650
0
$a
Data encryption (Computer science)
$3
658943
650
0
$a
Confidential communications.
$3
848105
650
0
$a
Electronics in espionage.
$3
848849
650
0
$a
Data transmission systems.
$3
563694
650
0
$a
Coding theory.
$3
561460
based on 0 review(s)
ALL
圖書館3F 書庫
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
E038214
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
003.54 D467 2012
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login