Flylib.com
Investigators Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Table of Contents
BackCover
Investigator s Guide to Steganography
Chapter 1: Introduction
Author s Intent
Who Should Read This Book?
Chapter 2: A Basic Understanding
Differences between Steganography and Cryptography
Differences between Steganography and Watermarking
The Prisoners Problem
Microdots
One-Time Pads
Semagrams
Null Ciphers
Anamorphosis
Acrostics
Type Spacing and Offsetting
Spread Spectrum
Invisible Ink
Newspaper Code
Jargon Code
Grilles (Cardano s Grille)
Bibliography
Chapter 3: History
The Greeks
Eneas the Tactician
The Chinese
Gaspar Schott
Johannes Trithemius
Giovanni Porta
Girolamo Cardano
Blaise de Vigenere
Auguste Kerchoffs
Bishop John Wilkins
Mary Queen of Scots
The Culpers and George Washington
The Pigeon Post into Paris 1870 - 1871
Civil War Rugs
World War I
World War II
The USS Pueblo, 1968
The Vietnam War
U.S.U.S.S.R. Nuclear Arms Treaties
Margaret Thatcher
Bibliography
Chapter 4: Steganography in Depth
The Six Categories of Steganography
Types of Steganography
Embedding Methods
Steganography Applied to Different Media
Issues in Information Hiding
Attacks
Bibliography
Chapter 5: Watermarking
Classification of Watermarks
Types of Watermarks
Reasons for Invisible Watermarking
Specific Watermarking Technologies
Requirements of a Robust Digital Watermark
Suitable Methods for Watermarking
Watermarks and Compression
Attacks
Fingerprinting
Summary: Diversity of Digital Watermarks
Bibliography
Chapter 6: Steganography Tools
BackYard
Blindside
BMP Secrets
bProtected 2000
BuryBury
CameraShy
Camouflage
Cloak
Contraband (Hell Edition)
Courier
Crypto 123
Dark Files
Data Stash
Digital Picture Envelope
Disk Hide
Dound
DPT 32
DriveCrypt
Drive Hider
Easy File Folder Protector
EasyMemo
EmptyPic
EncryptPic
EzStego
F5
FFEncode
File Protector
Folder Guard(TM)
GhostHost
Gif-It-Up
Gifshuffle
GZSteg
Hide It
Hide4PGP
Hide Drive
Hide Drives
Hide Folders
Hide In Picture
Hide Me
Hide-Seek v.5
Info Stego
InPlainView
InThePicture
Invisible Files 2000 Pro
Invisible Secrets
JP Hide and Seek
Jsteg Shell
KPK File
Magic Folders
MASKER
MergeStreams
MP3 Stego
NICETEXT
NookMe
OutGuess
PC FileSafe
Phototile
Picture Messenger
Point Lock PRO
PRETTY GOOD ENVELOPE
PrivateInfo
Protector
RightClickHide
Sam s Big Play Maker
SandMark
Scramdisk
Secret Space
SecurDesk
Snow
Spam Mimic
StealthDisk
Steghide
Steganosaurus
StegoTif
StegoWav
S-Tools
S-Tools Tutorial
SysCop
Texto
WbStego4
White Noise Storm
The Latest and Greatest: Hydan
Chapter 7: Products and Companies
AlpVision (W)
BlueSpike (W)
Compris (W) (S)
CenturionSoft (S)
Central Research Laboratories (CRL) (W)
Data Dot Technologies Ltd. (S)
DataMark Technologies
eWatermarking
InterTrust
Macrovision
MarkAny
MediaSec Technologies
MTL Systems, Inc.
SealTronic Technology, Inc.
Signum Technologies
Spectra Systems Corporation
Verance
WetStone Technologies: Stego Watch
Chapter 8: Real-World Uses
Workplace Communication
Monitoring of Radio Advertisements
Public Key Infrastructure (PKI) and Steganography
Digital Music
Intellectual Property Protection Systems
Steganography and the Internet
Terrorism
Foreign Interest
The Movie Industry
Steganographic File Systems
Bibliography
Chapter 9: Detection and Attacks
Attacks
Bibliography
Chapter 10: The Future
Bibliography
Chapter 11: Glossary
D-I
J-N
O-S
T-P
T-Y
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Page #219 (List of Figures)
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Surface Roughness
Differential to Common-Mode Conversion
Preferred Cable Combinations
Power Supply Filtering for Clock Sources, Repeaters, and PLL Circuits
Appendix E. erf( )
C++ GUI Programming with Qt 3
Making Connections
Signals and Slots in Depth
Basic Layouts
Scroll Views
Reimplementing Event Handlers
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Exploring VBAs Built-in Functions
Creating Your Own Objects in VBA
Customizing Chart Axes
Generating Nonlinear Curve Fits Using Excel Charts
Solving Nonlinear Equations Iteratively
Cisco CallManager Fundamentals (2nd Edition)
Circuit-Switched Systems
Calling Search Spaces and Partitions
Station Devices
SIP
Client Solutions
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case #1 background: RailCo Ltd.
Common misperceptions about SOA
Service Layers
The top-down strategy
Service-Oriented Design (Part III: Service Design)
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Handling WMI Events
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies