Skip to Main Content
Noiseless Steganography
book

Noiseless Steganography

by Abdelrahman Desoky
April 2016
Intermediate to advanced content levelIntermediate to advanced
300 pages
7h 14m
English
Auerbach Publications
Content preview from Noiseless Steganography

9

HEADSTEGA

Steganography Methodology

The frequent exchange of emails is widely popular and generates a high volume of traffic that allows communicating parties to establish a covert channel without a suspicious pattern. Thus, emails are an attractive steganographic carrier to transmit hidden messages. This was the motive for developing the Email-Headers-Based Steganography (Headstega) Methodology [24]. Headstega encodes a message then assigns it to steganographic carriers, e.g., recipient’s email addresses, names, or subject fields, to camouflage data. For example, Headstega can conceal a message in the primary and secondary message recipients’ addresses that are the “To” and “Cc” fields of an email respectively. In addition, the generated text ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Disappearing Cryptography, 3rd Edition

Disappearing Cryptography, 3rd Edition

Peter Wayner
Scene of the Cybercrime, 2nd Edition

Scene of the Cybercrime, 2nd Edition

Debra Littlejohn Shinder, Michael Cross
Computer Forensics

Computer Forensics

Robert C. Newman
Cyberjutsu

Cyberjutsu

Ben McCarty

Publisher Resources

ISBN: 9781439846223