語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Noiseless steganography : = the key ...
~
Desoky, Abdelrahman.
Noiseless steganography : = the key to covert communications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Noiseless steganography :/ Abdelrahman Desoky.
其他題名:
the key to covert communications /
作者:
Desoky, Abdelrahman.
出版者:
Boca Raton, FL :CRC Press, : c2012.,
面頁冊數:
xix, 282 p. :ill. ; : 24 cm.;
標題:
Data encryption (Computer science) -
ISBN:
9781439846216 (cloth) :
Noiseless steganography : = the key to covert communications /
Desoky, Abdelrahman.
Noiseless steganography :
the key to covert communications /Abdelrahman Desoky. - Boca Raton, FL :CRC Press,c2012. - xix, 282 p. :ill. ;24 cm.
Includes bibliographical references (p. 265-276) and index.
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher.
ISBN: 9781439846216 (cloth) :NT3634
LCCN: 2011046670
Nat. Bib. No.: GBB1B6364bnb
Nat. Bib. Agency Control No.: 015904075UkSubjects--Topical Terms:
658943
Data encryption (Computer science)
LC Class. No.: QA268 / .D47 2012
Dewey Class. No.: 003/.54
Noiseless steganography : = the key to covert communications /
LDR
:02635cam a22002654a 4500
001
715228
003
DLC
005
20120718095112.0
008
121122s2012 flua b 001 0 eng
010
$a
2011046670
015
$a
GBB1B6364
$2
bnb
016
7
$a
015904075
$2
Uk
020
$a
9781439846216 (cloth) :
$c
NT3634
020
$a
1439846219 (cloth)
035
$a
(OCoLC)ocn756281866
035
$a
2011046670
040
$a
DLC
$b
eng
$c
DLC
$d
YDX
$d
BTCTA
$d
UKMGB
$d
YDXCP
$d
BWX
$d
DLC
$d
NFU
042
$a
pcc
050
0 0
$a
QA268
$b
.D47 2012
082
0 0
$a
003/.54
$2
23
084
$a
BUS041000
$a
COM053000
$a
COM083000
$2
bisacsh
100
1
$a
Desoky, Abdelrahman.
$3
848848
245
1 0
$a
Noiseless steganography :
$b
the key to covert communications /
$c
Abdelrahman Desoky.
260
$a
Boca Raton, FL :
$c
c2012.
$b
CRC Press,
300
$a
xix, 282 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references (p. 265-276) and index.
520
$a
"Foreword Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the steganographic goal is not to hinder the adversary from decoding a hidden message, but to prevent the adversary from suspecting the existence of covert communications. When using any steganographic technique if suspicion is raised, the goal of steganography is defeated regardless of whether a plaintext is revealed. Contemporary steganography approaches camouflage data as noise in a cover that is assumed to look innocent. For example, the encoded message can be embedded as alteration of digital images, audio files, and text, without noticeable degradation. However, such alteration of authenticated covers can raise suspicion and makes the message detectable. Another example is when linguistics, e.g., using synonymous words, is exploited as a means to conceal a message, causing the presence of abnormal and sometimes weird sentences in a text that become discernible by human and machine examinations. The presence of such unjustifiable noise draws attention and unravels the hidden communications. This book introduces a novel Noiseless Steganography Paradigm (Nostega). Nostega neither hides data in a noise nor produces noise. xi i Foreword Instead, it camouflages messages in a form of unquestionable data in the generated cover. In addition, steganography approaches found in the literature have focused on how to conceal a message and not on how to camouflage its transmittal"--Provided by publisher.
650
0
$a
Data encryption (Computer science)
$3
658943
650
0
$a
Confidential communications.
$3
848105
650
0
$a
Electronics in espionage.
$3
848849
650
0
$a
Data transmission systems.
$3
563694
650
0
$a
Coding theory.
$3
561460
筆 0 讀者評論
全部
圖書館3F 書庫
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
E038214
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
003.54 D467 2012
一般使用(Normal)
在架
0
預約
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入