Skip to Main Content
Noiseless Steganography
book

Noiseless Steganography

by Abdelrahman Desoky
April 2016
Intermediate to advanced content levelIntermediate to advanced
300 pages
7h 14m
English
Auerbach Publications
Content preview from Noiseless Steganography

8

NORMALS

Normal Linguistic Steganography Methodology

Since the twentieth century, the progress and development of linguistic steganography have been minimal. Academically, roughly five major approaches were introduced before Nostega-based methodologies were invented: null cipher, mimic functions, NICETEXT, and the noise-based approach which included translation-based, confusing, and SMS-based approaches. Text cover of these approaches has numerous flaws such as incorrect syntax, lexicon, rhetoric, and grammar. Additionally, the content of such text cover is often meaningless and semantically incoherent. Such detectable noise (flaws) can easily raise suspicion during examinations by both humans and machines. These deficiencies render contemporary ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Disappearing Cryptography, 3rd Edition

Disappearing Cryptography, 3rd Edition

Peter Wayner
Scene of the Cybercrime, 2nd Edition

Scene of the Cybercrime, 2nd Edition

Debra Littlejohn Shinder, Michael Cross
Computer Forensics

Computer Forensics

Robert C. Newman
Cyberjutsu

Cyberjutsu

Ben McCarty

Publisher Resources

ISBN: 9781439846223