Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Buy Now
Noiseless Steganography - The Key to Covert Communications (Hardcover, New)
Loot Price: R3,477
Discovery Miles 34 770
|
|
Noiseless Steganography - The Key to Covert Communications (Hardcover, New)
Expected to ship within 12 - 17 working days
|
Among the features that make Noiseless Steganography: The Key to
Covert Communications a first of its kind: The first to
comprehensively cover Linguistic Steganography The first to
comprehensively cover Graph Steganography The first to
comprehensively cover Game Steganography Although the goal of
steganography is to prevent adversaries from suspecting the
existence of covert communications, most books on the subject
present outdated steganography approaches that are detectable by
human and/or machine examinations. These approaches often fail
because they camouflage data as a detectable noise by altering
digital images, audio files, text, etc. However, such alteration
raises suspicion and makes the message discernible by detecting its
noise. Addressing such shortcomings, Noiseless Steganography: The
Key to Covert Communications introduces a novel Noiseless
Steganography Paradigm (Nostega). Rather than hiding data in noise
or producing noise, Nostega camouflages messages as well as their
transmission in the form of unquestionable data in the generated
steganographic cover. The book explains how to use Nostega to
determine suitable domains capable of generating unsuspicious
steganographic cover in which messages are embedded in the form of
innocent data that is compatible with the chosen domain. It
presents a number of Nostega-based methodologies, including but not
limited to: A novel cover type that enables data to be hidden in
plotted graphs A novel methodology that pursues popular games such
as chess, checkers, crosswords, and dominoes to conceal messages
Comprehensive coverage of linguistic steganography Several novel
linguistic steganography methodologies based on Natural Language
Processing and Computational Linguistic techniques such as:
Education-Centric-Based, Summarization-Based, Natural Language
Generation Based, Random-Series-Based, Email Headers Based,
Automatic Joke Generation Based, List-Based, and Automatic Notes
Generation Based The first book to provide comprehensive coverage
of Linguistic Steganography, Graph Steganography, and Game
Steganography, it discusses the implementation and steganalysis
validation of ten Nostega-based methodologies. It describes how to
establish covert channels by employing the selected domain to serve
as justification for the interaction and delivery of the cover
among the communicating parties. Instead of using contemporary
steganography approaches to camouflage your data as noise that is
assumed to look innocent, the text provides you with the tools to
prevent your adversaries from suspecting the existence of covert
communications altogether.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.