11

LISTEGA

Steganography Methodology

The use of a textual list of items such as products, subjects, and books is widely popular and linguistically legible. This motivated the development of List-Based Steganography (Listega) Methodology [29]. Listega uses textual lists to camouflage data by exploiting itemized data to conceal messages. Simply, it encodes a message then assigns it to legitimate items in order to generate a text cover in the form of list. The generated list of items, the text cover, can be embedded among other legitimate non-coded items for more protection based on a predetermined protocol among communicating parties such as read every other item, every fifth item, or any method other than the use of a particular sequence. Listega ...

Get Noiseless Steganography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.