Noiseless Steganography: The Key to Covert Communications

IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Desoky, Abdelrahman
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusion NORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusion Headstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusion Jokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusion Listega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusion Steganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusion Conclusion and Future WorkContributionsBitrateFinal Conclusion and Future Work Bibliography Index.
DOI:10.1201/b11575