|
Tap code, 33, 34
Tattoos, 47
TCP/IP (Transmission Control Protocol), 66–75
encoding information in header, 67–69
Initial Sequence Number (ISN) field, 69–70
manipulation of IP identification field, 69–70
packet capture, 190–191
TCP acknowledge sequence number field bounce, 72–74
Technical steganography, 47–53
Telegraph, 22
Terrorism, 179–180
Text files, 56–57
TextHide, 152
TextMark, 151–152
Texto (steganography software), 144, 145
Text semagrams, 45–46
Texture block, 53
Thatcher, Margaret, 34
Three-way handshake, 71
Threshold fingerprinting, 96
TIFF images, 131
Tiny spaces, 45
Townsend, Robert, 23
Traitors, 96
Transform domain techniques, 41
Transform space, 41
Transform techniques, 49–52
Transposition, 20
TripleDES encryption algorithm, 132
Trithemius, Johannes, 18–19
Turning grille, 31–32
TwoFish algorithm, 101, 123
Type offsetting, 10–11, 45
Type spacing, 10–11, 45
Typewriter correction ribbon, 47
|