Flylib.com
Investigators Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Table of Contents
BackCover
Investigator s Guide to Steganography
Chapter 1: Introduction
Author s Intent
Who Should Read This Book?
Chapter 2: A Basic Understanding
Differences between Steganography and Cryptography
Differences between Steganography and Watermarking
The Prisoners Problem
Microdots
One-Time Pads
Semagrams
Null Ciphers
Anamorphosis
Acrostics
Type Spacing and Offsetting
Spread Spectrum
Invisible Ink
Newspaper Code
Jargon Code
Grilles (Cardano s Grille)
Bibliography
Chapter 3: History
The Greeks
Eneas the Tactician
The Chinese
Gaspar Schott
Johannes Trithemius
Giovanni Porta
Girolamo Cardano
Blaise de Vigenere
Auguste Kerchoffs
Bishop John Wilkins
Mary Queen of Scots
The Culpers and George Washington
The Pigeon Post into Paris 1870 - 1871
Civil War Rugs
World War I
World War II
The USS Pueblo, 1968
The Vietnam War
U.S.U.S.S.R. Nuclear Arms Treaties
Margaret Thatcher
Bibliography
Chapter 4: Steganography in Depth
The Six Categories of Steganography
Types of Steganography
Embedding Methods
Steganography Applied to Different Media
Issues in Information Hiding
Attacks
Bibliography
Chapter 5: Watermarking
Classification of Watermarks
Types of Watermarks
Reasons for Invisible Watermarking
Specific Watermarking Technologies
Requirements of a Robust Digital Watermark
Suitable Methods for Watermarking
Watermarks and Compression
Attacks
Fingerprinting
Summary: Diversity of Digital Watermarks
Bibliography
Chapter 6: Steganography Tools
BackYard
Blindside
BMP Secrets
bProtected 2000
BuryBury
CameraShy
Camouflage
Cloak
Contraband (Hell Edition)
Courier
Crypto 123
Dark Files
Data Stash
Digital Picture Envelope
Disk Hide
Dound
DPT 32
DriveCrypt
Drive Hider
Easy File Folder Protector
EasyMemo
EmptyPic
EncryptPic
EzStego
F5
FFEncode
File Protector
Folder Guard(TM)
GhostHost
Gif-It-Up
Gifshuffle
GZSteg
Hide It
Hide4PGP
Hide Drive
Hide Drives
Hide Folders
Hide In Picture
Hide Me
Hide-Seek v.5
Info Stego
InPlainView
InThePicture
Invisible Files 2000 Pro
Invisible Secrets
JP Hide and Seek
Jsteg Shell
KPK File
Magic Folders
MASKER
MergeStreams
MP3 Stego
NICETEXT
NookMe
OutGuess
PC FileSafe
Phototile
Picture Messenger
Point Lock PRO
PRETTY GOOD ENVELOPE
PrivateInfo
Protector
RightClickHide
Sam s Big Play Maker
SandMark
Scramdisk
Secret Space
SecurDesk
Snow
Spam Mimic
StealthDisk
Steghide
Steganosaurus
StegoTif
StegoWav
S-Tools
S-Tools Tutorial
SysCop
Texto
WbStego4
White Noise Storm
The Latest and Greatest: Hydan
Chapter 7: Products and Companies
AlpVision (W)
BlueSpike (W)
Compris (W) (S)
CenturionSoft (S)
Central Research Laboratories (CRL) (W)
Data Dot Technologies Ltd. (S)
DataMark Technologies
eWatermarking
InterTrust
Macrovision
MarkAny
MediaSec Technologies
MTL Systems, Inc.
SealTronic Technology, Inc.
Signum Technologies
Spectra Systems Corporation
Verance
WetStone Technologies: Stego Watch
Chapter 8: Real-World Uses
Workplace Communication
Monitoring of Radio Advertisements
Public Key Infrastructure (PKI) and Steganography
Digital Music
Intellectual Property Protection Systems
Steganography and the Internet
Terrorism
Foreign Interest
The Movie Industry
Steganographic File Systems
Bibliography
Chapter 9: Detection and Attacks
Attacks
Bibliography
Chapter 10: The Future
Bibliography
Chapter 11: Glossary
D-I
J-N
O-S
T-P
T-Y
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Page #219 (List of Figures)
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Adding Basic Controls and Lists
Formatting Forms
Setting Form Template and Digital Signing Options
Navigating the InfoPath Object Model
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Identifying Project Resource Risk
Managing Project Risk
Closing Projects
Software Configuration Management
Configuration Verification and Audit
A Practical Approach to Configuration Verification and Audit
Appendix A Project Plan
Appendix D Problem Change Report
Appendix L Software Requirements Changes
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Risk Analysis
Analysis and Design
Improving the Testing Process
Appendix D Sample Master Test Plan
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Four Precall Planning and Research
Chapter Ten Vision Re-engineering
Chapter Twelve Controlling the Buying Process
Chapter Fourteen Getting Started with the Process
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Color, Light, and Focus
Motion Titling Effects
Custom Scene Transitions
Appendix Adobe Photoshop and After Effects Resources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies