Investigator's Guide to Steganography
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1335 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1335 |
---|---|
record_format |
dspace |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.
It is an informative and entertaining resource that effectively communicates a general understanding of this complex field. |
format |
Book |
author |
Kipper, Gregory |
spellingShingle |
Kipper, Gregory Investigator's Guide to Steganography |
author_facet |
Kipper, Gregory |
author_sort |
Kipper, Gregory |
title |
Investigator's Guide to Steganography |
title_short |
Investigator's Guide to Steganography |
title_full |
Investigator's Guide to Steganography |
title_fullStr |
Investigator's Guide to Steganography |
title_full_unstemmed |
Investigator's Guide to Steganography |
title_sort |
investigator's guide to steganography |
publisher |
CRC Press |
publishDate |
2009 |
url |
https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1335 |
_version_ |
1819819896467357696 |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-13352009-11-27T08:30:53Z Investigator's Guide to Steganography Kipper, Gregory Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography. The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future. It is an informative and entertaining resource that effectively communicates a general understanding of this complex field. INTRODUCTION A BASIC UNDERSTANDING OF STEGANOGRAPHY * What is Steganography? * The Differences Between Steganography and Cryptography * The Differences Between Steganography and Watermarking * The Prisoner's Problem * Microdots * One-time Pads * Semagrams * Null Ciphers * Anamorphosis * Acrostics * Type Spacing and Offsetting * Spread Spectrum * Invisible Ink * Newspaper Code * Jargon Code * Grille's - Cardano's Grille HISTORY * The Egyptians * The Greeks * Aeneas the Tactician * The Chinese * Gaspar Schott * Johannes Trithemius * Giovanni Porta * Girolamo Cardano * Blaise de Vigenere * Auguste Kerchoffs * Bishop John Wilkins * Mary Queen of Scots * The Culpers and George Washington * The Pigeon Post into Paris * Civil War Rugs * World War I * World War II * The USS Pueblo * The Vietnam War * US/USSR Nuclear Arms Treaties * Margaret Thatcher STEGANOGRAPHY IN DEPTH * Steganography Techniques * The Six Categories of Steganography * Types of Steganography * Embedding Methods * Steganography Applied to Different Media * Attacks WATERMARKING * History * Classification of Watermarks * Types of Watermarks * Reasons for Invisible Watermarking * Specific Watermarking Technologies * Requirements of a Robust Digital Watermark * Suitable Methods for Watermarking * Watermarks and Compression * Attacks * Fingerprinting * Summary STEGANOGRAPHY TOOLS * Anahtar * BackYard * Blindside * BMP Secrets * bProtected® 2000 * BuryBury * Camera/Shy * Camouflage * Cloak * Contraband - Hell Edition * Courier * Crypto 123 * Dark Files * Data Stash * Digital Picture Envelope * Disk Hide * Dound * DPT 32 * DriveCrypt * Drive Hider * Easy File & Folder Protector * EasyMemo * EmptyPic * EncryptPic * EzStego * F5 * FFEncode * File Protector * Folder Guard™ * GhostHost * Gif-it-up * Gifshuffle * GZSteg * Hide It * Hide4PGP * Hide Drive * Hide Drives * Hide Folders * Hide In Picture * Hide Me * Hide-Seek v.50 * Info Stego * InPlainView * InThePicture * Invisible Files 2000 Pro * Invisible Secrets * JP Hide and Seek * Jsteg Shell * KPK File * Magic Folders * MASKER * MergeStreams * MP3 Stego * NICETEXT * NookMe * OutGuess * Palm Tree * Paranoid * PC FileSafe * Phototile * Picture Messenger * Point Lock PRO * PRETTY GOOD ENVELOPE * Private Info * Protector * RightClickHide * Sam's Big Playmaker * SandMark * Scramdisk * Secret Space * SecurDesk * Snow * Spammimmic * StealthDisk * Steghide * Steganosaurus * StegoTif * StegoWav * S-Tools * SysCop * Texto * WbStego * White Noise Storm * Latest and Greatest * Hydan PRODUCTS AND COMPANIES * Alpha-Tech Ltd * AlpVision * BlueSpike * Compris * CenturionSoft * Central Research Laboratories * Data Dot Technologies Ltd * DataMark Technologies * Digimarc * eWatermarking * Intertrust * Macrovision * MarkAny * MediaSec Technologies * MTL Systems, Inc * SealTronic Technology, Inc. * Signum Technologies * Spectra Systems Corporation * Verance * WetStone Technologies - Stego Watch REAL-WORLD USES * Medical Records * Workplace Communication * DNA Microdots * Monitoring of Radio Advertisements * PKI and Steganography * Digital Music * Intellectual Property Protection Systems * Digital Rights Management Systems * Intertrust * The Madison Project * Cryptolope * MagicGate and OpenMG * Systems Built on Encrypted MP3 files * MJuice * M-Trax * Key2Audio * Super Audio CD and DVD Audio * Recording Industry Association of America (RIAA) * Secure Digital Music Initiative (SDMI) * The MUSE Project * Steganography and the Internet * Terrorism and Foreign Interest * The Movie Industry * Steganographic File Systems DETECTION AND ATTACKS * Detection * Attacks THE FUTURE GLOSSARY 2009-11-27T08:30:53Z 2009-11-27T08:30:53Z 2003 Book https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1335 en application/octet-stream CRC Press |