Skip to Main Content
Noiseless Steganography
book

Noiseless Steganography

by Abdelrahman Desoky
April 2016
Intermediate to advanced content levelIntermediate to advanced
300 pages
7h 14m
English
Auerbach Publications
Content preview from Noiseless Steganography

11

LISTEGA

Steganography Methodology

The use of a textual list of items such as products, subjects, and books is widely popular and linguistically legible. This motivated the development of List-Based Steganography (Listega) Methodology [29]. Listega uses textual lists to camouflage data by exploiting itemized data to conceal messages. Simply, it encodes a message then assigns it to legitimate items in order to generate a text cover in the form of list. The generated list of items, the text cover, can be embedded among other legitimate non-coded items for more protection based on a predetermined protocol among communicating parties such as read every other item, every fifth item, or any method other than the use of a particular sequence. Listega ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Disappearing Cryptography, 3rd Edition

Disappearing Cryptography, 3rd Edition

Peter Wayner
Scene of the Cybercrime, 2nd Edition

Scene of the Cybercrime, 2nd Edition

Debra Littlejohn Shinder, Michael Cross
Computer Forensics

Computer Forensics

Robert C. Newman
Cyberjutsu

Cyberjutsu

Ben McCarty

Publisher Resources

ISBN: 9781439846223