語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Analysis of steganography in Interne...
~
ProQuest Information and Learning Co.
Analysis of steganography in Internet radio.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Analysis of steganography in Internet radio./
作者:
Lindsey, Daniel.
面頁冊數:
1 online resource (52 pages)
附註:
Source: Masters Abstracts International, Volume: 56-02.
Contained By:
Masters Abstracts International56-02(E).
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9781369431599
Analysis of steganography in Internet radio.
Lindsey, Daniel.
Analysis of steganography in Internet radio.
- 1 online resource (52 pages)
Source: Masters Abstracts International, Volume: 56-02.
Thesis (M.S.)
Includes bibliographical references
The use of steganography dates back millennia to the use of tattoos. As technology has improved through the ages, so to have the steganography methods. Computers have increased the ease and use of steganography and its transmission. Internet radio is a relatively new transmission method for steganography with little research and consideration. Knowing indicators of steganography over Internet radio such as audio degradation allows for better detection and analysis. Despite the lack of use of Internet radio as a transmission medium, there are laws that complicate its use. Understanding the transmission of steganography over Internet radio provides researchers and law enforcement a better idea of steganography methods that can be used and potentially detected. Steganography methods available include spread spectrum, echo hiding, LSB, MP3 ID3 header and even network steganography such as SCONeP or LACK. Many of these methods introduce noise into the audio file or disrupt the streaming capability of Internet radio. These methods may also violate copyright and transmission laws if discovered as well as international laws on the use of cryptography over telecommunications networks. The use of steganography within the MP3 ID3 headers provides the best chances of transmitting embedded messages over Internet radio due to the methods lack of audio and network degradation in concealing data.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369431599Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Analysis of steganography in Internet radio.
LDR
:02621ntm a2200349Ki 4500
001
909664
005
20180426091042.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369431599
035
$a
(MiAaPQ)AAI10244575
035
$a
(MiAaPQ)utica:10818
035
$a
AAI10244575
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Lindsey, Daniel.
$3
1180554
245
1 0
$a
Analysis of steganography in Internet radio.
264
0
$c
2016
300
$a
1 online resource (52 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-02.
500
$a
Adviser: Christopher Riddell.
502
$a
Thesis (M.S.)
$c
Utica College
$d
2016.
504
$a
Includes bibliographical references
520
$a
The use of steganography dates back millennia to the use of tattoos. As technology has improved through the ages, so to have the steganography methods. Computers have increased the ease and use of steganography and its transmission. Internet radio is a relatively new transmission method for steganography with little research and consideration. Knowing indicators of steganography over Internet radio such as audio degradation allows for better detection and analysis. Despite the lack of use of Internet radio as a transmission medium, there are laws that complicate its use. Understanding the transmission of steganography over Internet radio provides researchers and law enforcement a better idea of steganography methods that can be used and potentially detected. Steganography methods available include spread spectrum, echo hiding, LSB, MP3 ID3 header and even network steganography such as SCONeP or LACK. Many of these methods introduce noise into the audio file or disrupt the streaming capability of Internet radio. These methods may also violate copyright and transmission laws if discovered as well as international laws on the use of cryptography over telecommunications networks. The use of steganography within the MP3 ID3 headers provides the best chances of transmitting embedded messages over Internet radio due to the methods lack of audio and network degradation in concealing data.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
773
0
$t
Masters Abstracts International
$g
56-02(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10244575
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入