Flylib.com
Investigators Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Table of Contents
BackCover
Investigator s Guide to Steganography
Chapter 1: Introduction
Author s Intent
Who Should Read This Book?
Chapter 2: A Basic Understanding
Differences between Steganography and Cryptography
Differences between Steganography and Watermarking
The Prisoners Problem
Microdots
One-Time Pads
Semagrams
Null Ciphers
Anamorphosis
Acrostics
Type Spacing and Offsetting
Spread Spectrum
Invisible Ink
Newspaper Code
Jargon Code
Grilles (Cardano s Grille)
Bibliography
Chapter 3: History
The Greeks
Eneas the Tactician
The Chinese
Gaspar Schott
Johannes Trithemius
Giovanni Porta
Girolamo Cardano
Blaise de Vigenere
Auguste Kerchoffs
Bishop John Wilkins
Mary Queen of Scots
The Culpers and George Washington
The Pigeon Post into Paris 1870 - 1871
Civil War Rugs
World War I
World War II
The USS Pueblo, 1968
The Vietnam War
U.S.U.S.S.R. Nuclear Arms Treaties
Margaret Thatcher
Bibliography
Chapter 4: Steganography in Depth
The Six Categories of Steganography
Types of Steganography
Embedding Methods
Steganography Applied to Different Media
Issues in Information Hiding
Attacks
Bibliography
Chapter 5: Watermarking
Classification of Watermarks
Types of Watermarks
Reasons for Invisible Watermarking
Specific Watermarking Technologies
Requirements of a Robust Digital Watermark
Suitable Methods for Watermarking
Watermarks and Compression
Attacks
Fingerprinting
Summary: Diversity of Digital Watermarks
Bibliography
Chapter 6: Steganography Tools
BackYard
Blindside
BMP Secrets
bProtected 2000
BuryBury
CameraShy
Camouflage
Cloak
Contraband (Hell Edition)
Courier
Crypto 123
Dark Files
Data Stash
Digital Picture Envelope
Disk Hide
Dound
DPT 32
DriveCrypt
Drive Hider
Easy File Folder Protector
EasyMemo
EmptyPic
EncryptPic
EzStego
F5
FFEncode
File Protector
Folder Guard(TM)
GhostHost
Gif-It-Up
Gifshuffle
GZSteg
Hide It
Hide4PGP
Hide Drive
Hide Drives
Hide Folders
Hide In Picture
Hide Me
Hide-Seek v.5
Info Stego
InPlainView
InThePicture
Invisible Files 2000 Pro
Invisible Secrets
JP Hide and Seek
Jsteg Shell
KPK File
Magic Folders
MASKER
MergeStreams
MP3 Stego
NICETEXT
NookMe
OutGuess
PC FileSafe
Phototile
Picture Messenger
Point Lock PRO
PRETTY GOOD ENVELOPE
PrivateInfo
Protector
RightClickHide
Sam s Big Play Maker
SandMark
Scramdisk
Secret Space
SecurDesk
Snow
Spam Mimic
StealthDisk
Steghide
Steganosaurus
StegoTif
StegoWav
S-Tools
S-Tools Tutorial
SysCop
Texto
WbStego4
White Noise Storm
The Latest and Greatest: Hydan
Chapter 7: Products and Companies
AlpVision (W)
BlueSpike (W)
Compris (W) (S)
CenturionSoft (S)
Central Research Laboratories (CRL) (W)
Data Dot Technologies Ltd. (S)
DataMark Technologies
eWatermarking
InterTrust
Macrovision
MarkAny
MediaSec Technologies
MTL Systems, Inc.
SealTronic Technology, Inc.
Signum Technologies
Spectra Systems Corporation
Verance
WetStone Technologies: Stego Watch
Chapter 8: Real-World Uses
Workplace Communication
Monitoring of Radio Advertisements
Public Key Infrastructure (PKI) and Steganography
Digital Music
Intellectual Property Protection Systems
Steganography and the Internet
Terrorism
Foreign Interest
The Movie Industry
Steganographic File Systems
Bibliography
Chapter 9: Detection and Attacks
Attacks
Bibliography
Chapter 10: The Future
Bibliography
Chapter 11: Glossary
D-I
J-N
O-S
T-P
T-Y
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Page #219 (List of Figures)
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Strategies for Information Technology Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Master Test Planning
Detailed Test Planning
Test Execution
Some Final Thoughts…
Developing Tablet PC Applications (Charles River Media Programming)
Your First Program
Your First Windows Forms Application
Introduction to Ink-Enabled Applications
Speech Input with SAPI
3D Rendering with OpenGL and DirectX 9
Java How to Program (6th Edition) (How to Program (Deitel))
Modifying Our First Java Program
How Event Handling Works
Additional Compile-Time Translation Issues: Methods That Use a Type Parameter as the Return Type
Interface Collection and Class Collections
Wrap-Up
Junos Cookbook (Cookbooks (OReilly))
Logging Enterprise-Specific Traps
Limiting the Messages Collected
Performing a Loopback Test on a T1 Interface
Filtering Traffic Transiting the Router
Tracing PIM Packets
.NET-A Complete Development Cycle
GDI+ Programming
Conclusion
Advanced GDI+ Extensions
Project Management Issues
Requirements Tracing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies