Flylib.com
Investigators Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Table of Contents
BackCover
Investigator s Guide to Steganography
Chapter 1: Introduction
Author s Intent
Who Should Read This Book?
Chapter 2: A Basic Understanding
Differences between Steganography and Cryptography
Differences between Steganography and Watermarking
The Prisoners Problem
Microdots
One-Time Pads
Semagrams
Null Ciphers
Anamorphosis
Acrostics
Type Spacing and Offsetting
Spread Spectrum
Invisible Ink
Newspaper Code
Jargon Code
Grilles (Cardano s Grille)
Bibliography
Chapter 3: History
The Greeks
Eneas the Tactician
The Chinese
Gaspar Schott
Johannes Trithemius
Giovanni Porta
Girolamo Cardano
Blaise de Vigenere
Auguste Kerchoffs
Bishop John Wilkins
Mary Queen of Scots
The Culpers and George Washington
The Pigeon Post into Paris 1870 - 1871
Civil War Rugs
World War I
World War II
The USS Pueblo, 1968
The Vietnam War
U.S.U.S.S.R. Nuclear Arms Treaties
Margaret Thatcher
Bibliography
Chapter 4: Steganography in Depth
The Six Categories of Steganography
Types of Steganography
Embedding Methods
Steganography Applied to Different Media
Issues in Information Hiding
Attacks
Bibliography
Chapter 5: Watermarking
Classification of Watermarks
Types of Watermarks
Reasons for Invisible Watermarking
Specific Watermarking Technologies
Requirements of a Robust Digital Watermark
Suitable Methods for Watermarking
Watermarks and Compression
Attacks
Fingerprinting
Summary: Diversity of Digital Watermarks
Bibliography
Chapter 6: Steganography Tools
BackYard
Blindside
BMP Secrets
bProtected 2000
BuryBury
CameraShy
Camouflage
Cloak
Contraband (Hell Edition)
Courier
Crypto 123
Dark Files
Data Stash
Digital Picture Envelope
Disk Hide
Dound
DPT 32
DriveCrypt
Drive Hider
Easy File Folder Protector
EasyMemo
EmptyPic
EncryptPic
EzStego
F5
FFEncode
File Protector
Folder Guard(TM)
GhostHost
Gif-It-Up
Gifshuffle
GZSteg
Hide It
Hide4PGP
Hide Drive
Hide Drives
Hide Folders
Hide In Picture
Hide Me
Hide-Seek v.5
Info Stego
InPlainView
InThePicture
Invisible Files 2000 Pro
Invisible Secrets
JP Hide and Seek
Jsteg Shell
KPK File
Magic Folders
MASKER
MergeStreams
MP3 Stego
NICETEXT
NookMe
OutGuess
PC FileSafe
Phototile
Picture Messenger
Point Lock PRO
PRETTY GOOD ENVELOPE
PrivateInfo
Protector
RightClickHide
Sam s Big Play Maker
SandMark
Scramdisk
Secret Space
SecurDesk
Snow
Spam Mimic
StealthDisk
Steghide
Steganosaurus
StegoTif
StegoWav
S-Tools
S-Tools Tutorial
SysCop
Texto
WbStego4
White Noise Storm
The Latest and Greatest: Hydan
Chapter 7: Products and Companies
AlpVision (W)
BlueSpike (W)
Compris (W) (S)
CenturionSoft (S)
Central Research Laboratories (CRL) (W)
Data Dot Technologies Ltd. (S)
DataMark Technologies
eWatermarking
InterTrust
Macrovision
MarkAny
MediaSec Technologies
MTL Systems, Inc.
SealTronic Technology, Inc.
Signum Technologies
Spectra Systems Corporation
Verance
WetStone Technologies: Stego Watch
Chapter 8: Real-World Uses
Workplace Communication
Monitoring of Radio Advertisements
Public Key Infrastructure (PKI) and Steganography
Digital Music
Intellectual Property Protection Systems
Steganography and the Internet
Terrorism
Foreign Interest
The Movie Industry
Steganographic File Systems
Bibliography
Chapter 9: Detection and Attacks
Attacks
Bibliography
Chapter 10: The Future
Bibliography
Chapter 11: Glossary
D-I
J-N
O-S
T-P
T-Y
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Page #219 (List of Figures)
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Characters, Strings, and Text Output
Looping Commands
Number Crunching Mathematical and Relational Operators and Commands
Programming the Keyboard, Mouse, and Joystick
Playing Some Tunes CD Audio, MIDI and MP3 Music
Qshell for iSeries
Running Qshell
Parameters and Variables, Defined
Functions
Grep
Appendix C Qshell and CL Commands for the IFS
The Complete Cisco VPN Configuration Guide
VPN Definition
VPN Components
Authentication Methods
Summary
Summary
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 4. Connect Linux with a Bluetooth Phone
Hack 30. Monitor Wireless Links in Linux with Wavemon
Hack 59. Scan for Wireless Networks Automatically
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
Section A.3. 802.11b: The De Facto Standard
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Blue-Screen Garbage Mattes
Matte and Keying Plug-ins
Static Matte Painting in Photoshop
Scale and Speed
Appendix Adobe Photoshop and After Effects Resources
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Forms
Modern Controls
Data Controls
Dynamic User Interface
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies