Book description
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Contents
- Foreword
- Acknowledgments
- About the Author
- Chapter 1: Introduction
- Chapter 2: Related Work
- Chapter 3: Graph Steganography Methodology
- Chapter 4: Chess Steganography Methodology
- Chapter 5: Education-Centric Steganography Methodology
- Chapter 6: Summarization-Based Steganography Methodology
- Chapter 7: Mature Linguistic Steganography Methodology
- Chapter 8: Normal Linguistic Steganography Methodology
- Chapter 9: Steganography Methodology
- Chapter 10: Automatic Joke Generation-Based Steganography Methodology
- Chapter 11: Steganography Methodology
- Chapter 12: Steganography Methodology
- Chapter 13: Steganalysis Validation
- Chapter 14: Conclusion and Future Work
- Bibliography
- Index
Product information
- Title: Noiseless Steganography
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781466559110
You might also like
book
Disappearing Cryptography, 3rd Edition
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Computer Forensics
Presenting background information in computer and information systems and their use in the cyber environment, this …
book
Multimedia Security
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia …