Index_T


S

SACD (Super Audio CD), 177

SafeAudio copy protection, 156–157

SALT (Strategic Arms Limitation Treaty), 34

Sam's Big Play Maker (steganography software), 127, 128

SandMark (steganography software), 127–129

Schola Steganographica, 18–19

Schott, Gaspar, 18

Scramdisk (steganography software), 129

SDMI (Secure Digital Music Initiative), 170, 178

SealTronic Technology Inc., 159–160

Secret and Swift Messenger, The (book), 22

Secret messages, see Steganography

Secret Space (steganography software), 129

SecurDesk! (steganography software), 130

Secure Digital Music Initiative (SDMI), 170, 178

Secure Documents watermarking, 155

Semagrams, 8–9, 46

Semantic altering, 91

Semantic method, 56–57

Semantic nonaltering, 91

Semantic symbols, 8

Sharpening, of images, 79, 193

Shaved head, 17

Shoes, 47

Signal-to-noise ratio, 55

Signal-to-perceived noise ration, 55

SignIt! (watermarking software), 148–149

Signum Technologies, 161

Simple attack, 92

Slack space, 65–66

Snow (steganography software), 130

Soft bots, 93, 197

Softening of images, 79, 196

Software robots, 93

Sony Music, 172

Sound files, 5–6

Sound frequencies, 51–52

Spam Mimic (steganography software), 19, 38–39, 130–131

Sparta, 16–17

Spectra Systems Corp., 161–162

Spiders, 93, 197

Spread-spectrum encoding, 52–53

Spread-spectrum steganography, 11–12, 55

direct sequence, 41–42

frequency hopping, 42

and watermarking, 90

Spy films, 53

Spy messages, 3

Stamps, 32

Stars (quilt coding), 31

Star Trek, The Next Generation, 2

Statistical fingerprinting, 96

Statistical methods, 42

Statistical tests, 187

StealthDisk (steganography software), 131

Steganographic file systems, 57–60, 184–185

Steganography, 1

applied to different media, 53–57

attacks, 191–196

categories of, 39–42

vs. cryptography, 5–6

definition of, 5

detection, 187–191

future of, 199–200

history of, 15–34

illegal uses of, 199–200

and Internet, 179–180

legitimate uses of, 199

and PKI (public key infrastructure), 169

techniques in, 8–14, 37–39

types of, 42–53

vs. watermarking, 6

Steganography, uses of, 165–184

digital music, 169–170

DNA microdots, 166–167

intellectual property protection systems, 170–179

medical records, 165–166

monitoring of radio advertisements, 167

workplace communication, 166

Steganos 4 (security software), 152–153

Steganosaurus (steganography software), 131

SteganoSign (watermarking software), 156

Stegbreak (steganography software), 179, 189

Stegdetect (steganography software), 179, 187, 188

StegHide (steganography software), 131

Stego-key, 7

Stego medium

chosen-message attack, 79, 196

chosen-stego attack, 78, 195

known-cover attack, 77, 193

known-message attack, 78, 194

stego-only attack, 192

Stego-object, 7

Stego-only attack, 76, 191, 192

StegoTif (steganography software), 131

Stego Watch (steganography toolkit), 162–163

StegoWav (steganography software), 131–132

Still images, 53

StirMark attack, 92–93, 197

StirMark tool, 79

S-Tools (steganography software), 132

Analyze Disk option, 140

FDD (feature-driven development) module, 140

file size, 143

Fill Free Space option, 140

Hide File option, 142

hiding files with, 136–140

Reveal File option, 142–143

signature of, 144

tutorial, 132–136

Strategic Arms Limitation Treaty (SALT), 34

Substitution, 20, 37–38

Substitution cipher, 72

Substitution system, 39–41

Sung dynasty, 18

Super Audio CD (SACD), 177

Super MagicGate copyright protection technology, 174

SureSign software, 161

SYN (synchronize) packet, 66–67, 72, 73

Syntactic method, 56

SysCop (steganography software), 144, 162




Investigator's Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net