Wonder Club world wonders pyramid logo
×

Investigator's Guide to Steganography Book

Investigator's Guide to Steganography
Be the First to Review this Item at Wonderclub
X
Investigator's Guide to Steganography, Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there , Investigator's Guide to Steganography
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Investigator's Guide to Steganography
  • Written by author Gregory Kipper
  • Published by CRC Press, 10/27/2003
  • Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

INTRODUCTION

A BASIC UNDERSTANDING OF STEGANOGRAPHY
What is Steganography?
The Differences Between Steganography and Cryptography
The Differences Between Steganography and Watermarking
The Prisoner's Problem
Microdots
One-time Pads
Semagrams
Null Ciphers
Anamorphosis
Acrostics
Type Spacing and Offsetting
Spread Spectrum
Invisible Ink
Newspaper Code
Jargon Code
Grille's - Cardano's Grille

HISTORY
The Egyptians
The Greeks
Aeneas the Tactician
The Chinese
Gaspar Schott
Johannes Trithemius
Giovanni Porta
Girolamo Cardano
Blaise de Vigenere
Auguste Kerchoffs
Bishop John Wilkins
Mary Queen of Scots
The Culpers and George Washington
The Pigeon Post into Paris
Civil War Rugs
World War I
World War II
The USS Pueblo
The Vietnam War
US/USSR Nuclear Arms Treaties
Margaret Thatcher

STEGANOGRAPHY IN DEPTH
Steganography Techniques
The Six Categories of Steganography
Types of Steganography
Embedding Methods
Steganography Applied to Different Media
Attacks

WATERMARKING
History
Classification of Watermarks
Types of Watermarks
Reasons for Invisible Watermarking
Specific Watermarking Technologies
Requirements of a Robust Digital Watermark
Suitable Methods for Watermarking
Watermarks and Compression
Attacks
Fingerprinting
Summary

STEGANOGRAPHY TOOLS
Anahtar
BackYard
Blindside
BMP Secrets
bProtected® 2000
BuryBury
Camera/Shy
Camouflage
Cloak
Contraband - Hell Edition
Courier
Crypto 123
Dark Files
Data Stash
Digital Picture Envelope
Disk Hide
Dound
DPT 32
DriveCrypt
Drive Hider
Easy File & Folder Protector
EasyMemo
EmptyPic
EncryptPic
EzStego
F5
FFEncode
File Protector
Folder Guard™
GhostHost
Gif-it-up
Gifshuffle
GZSteg
Hide It
Hide4PGP
Hide Drive
Hide Drives
Hide Folders
Hide In Picture
Hide Me
Hide-Seek v.50
Info Stego
InPlainView
InThePicture
Invisible Files 2000 Pro
Invisible Secrets
JP Hide and Seek
Jsteg Shell
KPK File
Magic Folders
MASKER
MergeStreams
MP3 Stego
NICETEXT
NookMe
OutGuess
Palm Tree
Paranoid
PC FileSafe
Phototile
Picture Messenger
Point Lock PRO
PRETTY GOOD ENVELOPE
Private Info
Protector
RightClickHide
Sam's Big Playmaker
SandMark
Scramdisk
Secret Space
SecurDesk
Snow
Spammimmic
StealthDisk
Steghide
Steganosaurus
StegoTif
StegoWav
S-Tools
SysCop
Texto
WbStego
White Noise Storm
Latest and Greatest
Hydan

PRODUCTS AND COMPANIES
Alpha-Tech Ltd
AlpVision
BlueSpike
Compris
CenturionSoft
Central Research Laboratories
Data Dot Technologies Ltd
DataMark Technologies
Digimarc
eWatermarking
Intertrust
Macrovision
MarkAny
MediaSec Technologies
MTL Systems, Inc
SealTronic Technology, Inc.
Signum Technologies
Spectra Systems Corporation
Verance
WetStone Technologies - Stego Watch

REAL-WORLD USES
Medical Records
Workplace Communication
DNA Microdots
Monitoring of Radio Advertisements
PKI and Steganography
Digital Music
Intellectual Property Protection Systems
Digital Rights Management Systems
Intertrust
The Madison Project
Cryptolope
MagicGate and OpenMG
Systems Built on Encrypted MP3 files
MJuice
M-Trax
Key2Audio
Super Audio CD and DVD Audio
Recording Industry Association of America (RIAA)
Secure Digital Music Initiative (SDMI)
The MUSE Project
Steganography and the Internet
Terrorism and Foreign Interest
The Movie Industry
Steganographic File Systems

DETECTION AND ATTACKS
Detection
Attacks

THE FUTURE

GLOSSARY


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Investigator's Guide to Steganography, Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there , Investigator's Guide to Steganography

X
WonderClub Home

This item is in your Collection

Investigator's Guide to Steganography, Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there , Investigator's Guide to Steganography

Investigator's Guide to Steganography

X
WonderClub Home

This Item is in Your Inventory

Investigator's Guide to Steganography, Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there , Investigator's Guide to Steganography

Investigator's Guide to Steganography

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: