Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Kipper, Gregory
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1335
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1335
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography. The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future. It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.
format Book
author Kipper, Gregory
spellingShingle Kipper, Gregory
Investigator's Guide to Steganography
author_facet Kipper, Gregory
author_sort Kipper, Gregory
title Investigator's Guide to Steganography
title_short Investigator's Guide to Steganography
title_full Investigator's Guide to Steganography
title_fullStr Investigator's Guide to Steganography
title_full_unstemmed Investigator's Guide to Steganography
title_sort investigator's guide to steganography
publisher CRC Press
publishDate 2009
url https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1335
_version_ 1819819896467357696
spelling oai:scholar.dlu.edu.vn:DLU123456789-13352009-11-27T08:30:53Z Investigator's Guide to Steganography Kipper, Gregory Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography. The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future. It is an informative and entertaining resource that effectively communicates a general understanding of this complex field. INTRODUCTION A BASIC UNDERSTANDING OF STEGANOGRAPHY * What is Steganography? * The Differences Between Steganography and Cryptography * The Differences Between Steganography and Watermarking * The Prisoner's Problem * Microdots * One-time Pads * Semagrams * Null Ciphers * Anamorphosis * Acrostics * Type Spacing and Offsetting * Spread Spectrum * Invisible Ink * Newspaper Code * Jargon Code * Grille's - Cardano's Grille HISTORY * The Egyptians * The Greeks * Aeneas the Tactician * The Chinese * Gaspar Schott * Johannes Trithemius * Giovanni Porta * Girolamo Cardano * Blaise de Vigenere * Auguste Kerchoffs * Bishop John Wilkins * Mary Queen of Scots * The Culpers and George Washington * The Pigeon Post into Paris * Civil War Rugs * World War I * World War II * The USS Pueblo * The Vietnam War * US/USSR Nuclear Arms Treaties * Margaret Thatcher STEGANOGRAPHY IN DEPTH * Steganography Techniques * The Six Categories of Steganography * Types of Steganography * Embedding Methods * Steganography Applied to Different Media * Attacks WATERMARKING * History * Classification of Watermarks * Types of Watermarks * Reasons for Invisible Watermarking * Specific Watermarking Technologies * Requirements of a Robust Digital Watermark * Suitable Methods for Watermarking * Watermarks and Compression * Attacks * Fingerprinting * Summary STEGANOGRAPHY TOOLS * Anahtar * BackYard * Blindside * BMP Secrets * bProtected® 2000 * BuryBury * Camera/Shy * Camouflage * Cloak * Contraband - Hell Edition * Courier * Crypto 123 * Dark Files * Data Stash * Digital Picture Envelope * Disk Hide * Dound * DPT 32 * DriveCrypt * Drive Hider * Easy File & Folder Protector * EasyMemo * EmptyPic * EncryptPic * EzStego * F5 * FFEncode * File Protector * Folder Guard™ * GhostHost * Gif-it-up * Gifshuffle * GZSteg * Hide It * Hide4PGP * Hide Drive * Hide Drives * Hide Folders * Hide In Picture * Hide Me * Hide-Seek v.50 * Info Stego * InPlainView * InThePicture * Invisible Files 2000 Pro * Invisible Secrets * JP Hide and Seek * Jsteg Shell * KPK File * Magic Folders * MASKER * MergeStreams * MP3 Stego * NICETEXT * NookMe * OutGuess * Palm Tree * Paranoid * PC FileSafe * Phototile * Picture Messenger * Point Lock PRO * PRETTY GOOD ENVELOPE * Private Info * Protector * RightClickHide * Sam's Big Playmaker * SandMark * Scramdisk * Secret Space * SecurDesk * Snow * Spammimmic * StealthDisk * Steghide * Steganosaurus * StegoTif * StegoWav * S-Tools * SysCop * Texto * WbStego * White Noise Storm * Latest and Greatest * Hydan PRODUCTS AND COMPANIES * Alpha-Tech Ltd * AlpVision * BlueSpike * Compris * CenturionSoft * Central Research Laboratories * Data Dot Technologies Ltd * DataMark Technologies * Digimarc * eWatermarking * Intertrust * Macrovision * MarkAny * MediaSec Technologies * MTL Systems, Inc * SealTronic Technology, Inc. * Signum Technologies * Spectra Systems Corporation * Verance * WetStone Technologies - Stego Watch REAL-WORLD USES * Medical Records * Workplace Communication * DNA Microdots * Monitoring of Radio Advertisements * PKI and Steganography * Digital Music * Intellectual Property Protection Systems * Digital Rights Management Systems * Intertrust * The Madison Project * Cryptolope * MagicGate and OpenMG * Systems Built on Encrypted MP3 files * MJuice * M-Trax * Key2Audio * Super Audio CD and DVD Audio * Recording Industry Association of America (RIAA) * Secure Digital Music Initiative (SDMI) * The MUSE Project * Steganography and the Internet * Terrorism and Foreign Interest * The Movie Industry * Steganographic File Systems DETECTION AND ATTACKS * Detection * Attacks THE FUTURE GLOSSARY 2009-11-27T08:30:53Z 2009-11-27T08:30:53Z 2003 Book https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1335 en application/octet-stream CRC Press