Foreword |
|
xiii | |
Acknowledgments |
|
xvii | |
About the Author |
|
xix | |
|
|
1 | (10) |
|
1.1 Steganography: Definition, Current State, and Concerns |
|
|
1 | (1) |
|
1.2 Noiseless Steganography (Nostega) Paradigm |
|
|
2 | (5) |
|
1.2.1 The Architecture of Nostega |
|
|
4 | (2) |
|
1.2.2 Advantages of Nostega |
|
|
6 | (1) |
|
1.3 Summary of the Contributions |
|
|
7 | (3) |
|
|
10 | (1) |
|
|
11 | (8) |
|
2.1 Textual Steganography |
|
|
11 | (6) |
|
2.1.1 Textual Format Manipulation (TFM) |
|
|
11 | (1) |
|
2.1.2 Series of Characters and Words |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (2) |
|
2.2 Non-Textual Steganography |
|
|
17 | (2) |
|
Chapter 3 Graphstega: Graph Steganography Methodology |
|
|
19 | (12) |
|
3.1 Graphstega Methodology |
|
|
19 | (5) |
|
|
20 | (2) |
|
|
22 | (2) |
|
3.2 Other Steganographic Cover Types |
|
|
24 | (4) |
|
3.2.1 Graph in Image Cover |
|
|
25 | (1) |
|
3.2.2 Presenting the Graph's Data in Text Cover |
|
|
26 | (1) |
|
3.2.3 Presenting the Graph's Data in Audio Cover |
|
|
26 | (2) |
|
3.3 Communications Protocol |
|
|
28 | (2) |
|
|
30 | (1) |
|
Chapter 4 Chestega: Chess Steganography Methodology |
|
|
31 | (18) |
|
|
31 | (9) |
|
|
32 | (2) |
|
4.1.2 Determining Encoding Parameters |
|
|
34 | (1) |
|
4.1.3 Defining Message Encoder |
|
|
35 | (1) |
|
4.1.4 Message Camouflaging Scheme |
|
|
36 | (3) |
|
4.1.5 Chestega Configuration |
|
|
39 | (1) |
|
4.2 Chestega Implementation |
|
|
40 | (6) |
|
4.2.1 Chessboard-based Example |
|
|
40 | (2) |
|
|
42 | (4) |
|
|
46 | (3) |
|
Chapter 5 Edustega: Education-Centric Steganography Methodology |
|
|
49 | (24) |
|
|
49 | (12) |
|
|
50 | (2) |
|
5.1.2 Establishing Covert Channel |
|
|
52 | (2) |
|
|
54 | (4) |
|
5.1.4 Message Camouflaging |
|
|
58 | (3) |
|
5.2 Edustega Implementation |
|
|
61 | (10) |
|
|
62 | (4) |
|
|
66 | (4) |
|
|
70 | (1) |
|
|
71 | (2) |
|
Chapter 6 Sumstega: Summarization-Based Steganography Methodology |
|
|
73 | (22) |
|
6.1 Automatic Summarization Overview |
|
|
73 | (1) |
|
|
74 | (7) |
|
|
75 | (2) |
|
|
77 | (3) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (12) |
|
|
82 | (1) |
|
6.3.2 Sumstega Architecture |
|
|
83 | (2) |
|
|
85 | (1) |
|
6.3.4 Sumstega Camouflager |
|
|
86 | (3) |
|
6.3.5 Implementation Example |
|
|
89 | (1) |
|
6.3.5.1 Sample of Sumstega Cover |
|
|
90 | (1) |
|
6.3.6 Sumstega Communications Protocol |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
Chapter 7 Matlist: Mature Linguistic Steganography Methodology |
|
|
95 | (36) |
|
|
96 | (3) |
|
7.1.1 Natural Language Generation and Template |
|
|
96 | (1) |
|
7.1.2 Matlist Versus Previous Work |
|
|
97 | (2) |
|
|
99 | (11) |
|
7.2.1 Matlist Architecture Overview |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (3) |
|
7.2.4 Building Matlist Encoder |
|
|
106 | (1) |
|
7.2.5 Building Matlist NLG or Template System |
|
|
107 | (2) |
|
7.2.6 Implementing Matlist Communications Protocol |
|
|
109 | (1) |
|
7.3 Matlist Implementation |
|
|
110 | (19) |
|
7.3.1 DSS of Consumer Price Index |
|
|
111 | (1) |
|
7.3.1.1 First Implementation Example of CPI |
|
|
112 | (4) |
|
7.3.1.2 Second Implementation Example of CPI |
|
|
116 | (3) |
|
7.3.1.3 Text Substitution |
|
|
119 | (1) |
|
7.3.1.4 Third Implementation Example of CPI |
|
|
119 | (4) |
|
|
123 | (1) |
|
7.3.2.1 DSS of Elementary Math |
|
|
123 | (1) |
|
7.3.2.2 DSS of Selling Books |
|
|
124 | (2) |
|
|
126 | (1) |
|
7.3.2.4 DSS of Discrete Math |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (2) |
|
Chapter 8 Normals: Normal Linguistic Steganography Methodology |
|
|
131 | (22) |
|
|
132 | (7) |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
8.1.5 Normals Communications Protocol |
|
|
137 | (2) |
|
8.2 Normals Implementation |
|
|
139 | (9) |
|
8.2.1 Determining Normals NLGS |
|
|
140 | (2) |
|
8.2.2 Determining Normals Encoder |
|
|
142 | (1) |
|
|
143 | (3) |
|
8.2.4 Determining Normals Communications Protocol |
|
|
146 | (2) |
|
|
148 | (3) |
|
|
151 | (2) |
|
Chapter 9 Headstega: Steganography Methodology |
|
|
153 | (14) |
|
9.1 Headstega Methodology |
|
|
154 | (6) |
|
|
154 | (3) |
|
|
157 | (1) |
|
9.1.3 Message Camouflager |
|
|
158 | (2) |
|
9.2 Headstega Implementation |
|
|
160 | (5) |
|
9.2.1 Headstega Configuration |
|
|
161 | (1) |
|
|
162 | (1) |
|
9.2.2.1 Sample Head Cover |
|
|
163 | (1) |
|
|
163 | (2) |
|
|
165 | (2) |
|
Chapter 10 Jokestega: Automatic Joke Generation-Based Steganography Methodology |
|
|
167 | (20) |
|
10.1 Automatic Joke Generation Systems |
|
|
168 | (1) |
|
10.2 Jokestega Methodology |
|
|
168 | (7) |
|
10.2.1 Automatic Jokes Generator System |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
10.2.4 Establishing Covert Channel |
|
|
174 | (1) |
|
10.3 Jokestega Implementation |
|
|
175 | (9) |
|
|
176 | (3) |
|
10.3.2 Joke Cover Example |
|
|
179 | (2) |
|
10.3.3 Jokestega Performance |
|
|
181 | (3) |
|
|
184 | (3) |
|
Chapter 11 Listega: Steganography Methodology |
|
|
187 | (16) |
|
|
187 | (9) |
|
11.1.1 Listega Architecture |
|
|
188 | (2) |
|
11.1.2 Domain Determination |
|
|
190 | (1) |
|
|
191 | (1) |
|
11.1.4 Message Camouflager |
|
|
192 | (3) |
|
11.1.5 Communications Protocol |
|
|
195 | (1) |
|
11.2 Listega Implementation |
|
|
196 | (6) |
|
11.2.1 Listega Configuration |
|
|
196 | (2) |
|
|
198 | (4) |
|
|
202 | (1) |
|
Chapter 12 Notestega: Steganography Methodology |
|
|
203 | (12) |
|
12.1 Automatic Note Taking |
|
|
204 | (1) |
|
12.2 Notestega Methodology |
|
|
205 | (5) |
|
12.2.1 Notestega Architecture |
|
|
206 | (2) |
|
12.2.2 Topic(s) Determination |
|
|
208 | (1) |
|
|
208 | (1) |
|
12.2.4 Message Camouflager |
|
|
209 | (1) |
|
12.3 Notestega Implementation |
|
|
210 | (3) |
|
12.3.1 Notestega Configuration |
|
|
210 | (2) |
|
12.3.2 Samples of Note Cover |
|
|
212 | (1) |
|
|
213 | (2) |
|
Chapter 13 Steganalysis Validation |
|
|
215 | (40) |
|
|
215 | (1) |
|
13.2 Contrast and Comparison Attacks |
|
|
216 | (1) |
|
|
217 | (1) |
|
13.4 Statistical Signature |
|
|
218 | (32) |
|
|
219 | (13) |
|
13.4.2 Letter Frequency Distribution |
|
|
232 | (14) |
|
13.4.3 Kullback-Leibler Divergence |
|
|
246 | (4) |
|
|
250 | (5) |
|
Chapter 14 Conclusion and Future Work |
|
|
255 | (10) |
|
|
255 | (4) |
|
|
259 | (3) |
|
14.3 Final Conclusion and Future Work |
|
|
262 | (3) |
Bibliography |
|
265 | (12) |
Index |
|
277 | |