Skip to Main Content
Noiseless Steganography
book

Noiseless Steganography

by Abdelrahman Desoky
April 2016
Intermediate to advanced content levelIntermediate to advanced
300 pages
7h 14m
English
Auerbach Publications
Content preview from Noiseless Steganography

2

RELATED WORK

This chapter discusses the contemporary steganography approaches found in the literature and highlights their shortcomings. The published schemes are categorized, based on the steganographic cover type, into textual and non-textual schemes; each is discussed in a distinct section.

2.1 Textual Steganography

Textual steganography approaches conceal data in a text cover. These approaches can be categorized as follows.

2.1.1 Textual Format Manipulation (TFM)

This is a nonlinguistic steganography technique that hides data by exploiting the format of text [23]. TFM modifies an original text by employing spaces, misspellings, fonts, font size, font style, colors, and non-color (as invisible ink) to embed an encoded message. However, comparing ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Disappearing Cryptography, 3rd Edition

Disappearing Cryptography, 3rd Edition

Peter Wayner
Scene of the Cybercrime, 2nd Edition

Scene of the Cybercrime, 2nd Edition

Debra Littlejohn Shinder, Michael Cross
Computer Forensics

Computer Forensics

Robert C. Newman
Cyberjutsu

Cyberjutsu

Ben McCarty

Publisher Resources

ISBN: 9781439846223