D-I


A-C

ACC

Audio Communications Controller

Acrostic

A poem or series of lines in which certain letters, usually the first in each line, form a name, motto, or message when read in sequence.

Anamorphosis

An image or the production of an image that appears distorted unless it is viewed from a special angle or with a special instrument.

Anonymity

The state in which something is unknown or unacknowledged.

Audio masking

A condition where one sound interferes with the perception of another sound.

Blind scheme

An extraction process method that can recover the hidden message only by means of the encoded data.

Bootleg

An unauthorized recording of a live or broadcast performance, which is duplicated and sold without the permission of the artist, composer, or record company.

Bote-swaine cipher

A steganographic cipher used by Francis Bacon to insert his name within the text of his writings.

Cardano's grille

A method of concealing a message by which a piece of paper has several holes cut in it (the grille), and when it is placed over an innocent-looking message the holes cover all but specific letters, spelling out the message. It was named for its inventor, Girolamo Cardano.

Chosen message attack

A type of attack where the steganalyst generates a stego-medium from a message using some particular tool, looking for signatures that will enable the detection of other stego-media.

Chosen stego attack

A type of attack where both the stego-medium and the steganography tool or algorithm are available.

Cipher disk

An additive cipher device used for encrypting and decrypting messages. The disk consists of two concentric circular scales, usually of letters, and the alphabets can be repositioned with respect to one another at any of the 26 relationships.

Coefficient

A number or symbol multiplied with a variable or an unknown quantity in an algebraic term.

Color palette

A set of available colors a computer or an application can display. Also known as a CLUT: Color Look Up Table.

Compression

A method of storing data in a format that requires less space than normal.

Counterfeits

Duplicates that are copied and packaged to resemble the original as closely as possible. The original producer's trademarks and logos are reproduced in order to mislead the consumer into believing that he is buying an original product.

Cover escrow

An extraction process method that needs both the original piece of information and the encoded one in order to extract the embedded data.

Cover medium

The medium in which data is hidden; it can be an innocent-looking piece of information for steganography, or an important medium that must be protected for copyright or integrity reasons.

Covert channel

A channel of communication within a computer system or network that is not designed or intended to transfer information.

Cryptolope

Cryptographic envelope, an IBM product. Cryptolope objects are used for secure, protected delivery of digital content by using encryption and digital signatures.




Investigator's Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net