Investigator's Guide to Steganography
By: Gregory Kipper (author)Hardback
More than 4 weeks availability
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography. The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism.
The book concludes by reviewing steganography detection methods and what can be expected in the future. It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.
INTRODUCTION A BASIC UNDERSTANDING OF STEGANOGRAPHY What is Steganography? The Differences Between Steganography and Cryptography The Differences Between Steganography and Watermarking The Prisoner's Problem Microdots One-time Pads Semagrams Null Ciphers Anamorphosis Acrostics Type Spacing and Offsetting Spread Spectrum Invisible Ink Newspaper Code Jargon Code Grille's - Cardano's Grille HISTORY The Egyptians The Greeks Aeneas the Tactician The Chinese Gaspar Schott Johannes Trithemius Giovanni Porta Girolamo Cardano Blaise de Vigenere Auguste Kerchoffs Bishop John Wilkins Mary Queen of Scots The Culpers and George Washington The Pigeon Post into Paris Civil War Rugs World War I World War II The USS Pueblo The Vietnam War US/USSR Nuclear Arms Treaties Margaret Thatcher STEGANOGRAPHY IN DEPTH Steganography Techniques The Six Categories of Steganography Types of Steganography Embedding Methods Steganography Applied to Different Media Attacks WATERMARKING History Classification of Watermarks Types of Watermarks Reasons for Invisible Watermarking Specific Watermarking Technologies Requirements of a Robust Digital Watermark Suitable Methods for Watermarking Watermarks and Compression Attacks Fingerprinting Summary STEGANOGRAPHY TOOLS Anahtar BackYard Blindside BMP Secrets bProtected(R) 2000 BuryBury Camera/Shy Camouflage Cloak Contraband - Hell Edition Courier Crypto 123 Dark Files Data Stash Digital Picture Envelope Disk Hide Dound DPT 32 DriveCrypt Drive Hider Easy File & Folder Protector EasyMemo EmptyPic EncryptPic EzStego F5 FFEncode File Protector Folder Guard(TM) GhostHost Gif-it-up Gifshuffle GZSteg Hide It Hide4PGP Hide Drive Hide Drives Hide Folders Hide In Picture Hide Me Hide-Seek v.50 Info Stego InPlainView InThePicture Invisible Files 2000 Pro Invisible Secrets JP Hide and Seek Jsteg Shell KPK File Magic Folders MASKER MergeStreams MP3 Stego NICETEXT NookMe OutGuess Palm Tree Paranoid PC FileSafe Phototile Picture Messenger Point Lock PRO PRETTY GOOD ENVELOPE Private Info Protector RightClickHide Sam's Big Playmaker SandMark Scramdisk Secret Space SecurDesk Snow Spammimmic StealthDisk Steghide Steganosaurus StegoTif StegoWav S-Tools SysCop Texto WbStego White Noise Storm Latest and Greatest Hydan PRODUCTS AND COMPANIES Alpha-Tech Ltd AlpVision BlueSpike Compris CenturionSoft Central Research Laboratories Data Dot Technologies Ltd DataMark Technologies Digimarc eWatermarking Intertrust Macrovision MarkAny MediaSec Technologies MTL Systems, Inc SealTronic Technology, Inc. Signum Technologies Spectra Systems Corporation Verance WetStone Technologies - Stego Watch REAL-WORLD USES Medical Records Workplace Communication DNA Microdots Monitoring of Radio Advertisements PKI and Steganography Digital Music Intellectual Property Protection Systems Digital Rights Management Systems Intertrust The Madison Project Cryptolope MagicGate and OpenMG Systems Built on Encrypted MP3 files MJuice M-Trax Key2Audio Super Audio CD and DVD Audio Recording Industry Association of America (RIAA) Secure Digital Music Initiative (SDMI) The MUSE Project Steganography and the Internet Terrorism and Foreign Interest The Movie Industry Steganographic File Systems DETECTION AND ATTACKS Detection Attacks THE FUTURE GLOSSARY
Number Of Pages:
- ID: 9780849324338
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2016 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36