Kipper | Investigator's Guide to Steganography | E-Book | sack.de
E-Book

E-Book, Englisch, 240 Seiten

Kipper Investigator's Guide to Steganography


Erscheinungsjahr 2003
ISBN: 978-0-203-50476-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 240 Seiten

ISBN: 978-0-203-50476-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Kipper Investigator's Guide to Steganography jetzt bestellen!

Zielgruppe


Information security professionals, IT engineers, IT forensic investigators, law enforcement personnel


Autoren/Hrsg.


Weitere Infos & Material


INTRODUCTION

A BASIC UNDERSTANDING OF STEGANOGRAPHY
What is Steganography?
The Differences Between Steganography and Cryptography
The Differences Between Steganography and Watermarking
The Prisoner's Problem
Microdots
One-time Pads
Semagrams
Null Ciphers
Anamorphosis
Acrostics
Type Spacing and Offsetting
Spread Spectrum
Invisible Ink
Newspaper Code
Jargon Code
Grille's - Cardano's Grille

HISTORY
The Egyptians
The Greeks
Aeneas the Tactician
The Chinese
Gaspar Schott
Johannes Trithemius
Giovanni Porta
Girolamo Cardano
Blaise de Vigenere
Auguste Kerchoffs
Bishop John Wilkins
Mary Queen of Scots
The Culpers and George Washington
The Pigeon Post into Paris
Civil War Rugs
World War I
World War II
The USS Pueblo
The Vietnam War
US/USSR Nuclear Arms Treaties
Margaret Thatcher

STEGANOGRAPHY IN DEPTH
Steganography Techniques
The Six Categories of Steganography
Types of Steganography
Embedding Methods
Steganography Applied to Different Media
Attacks

WATERMARKING
History
Classification of Watermarks
Types of Watermarks
Reasons for Invisible Watermarking
Specific Watermarking Technologies
Requirements of a Robust Digital Watermark
Suitable Methods for Watermarking
Watermarks and Compression
Attacks
Fingerprinting
Summary

STEGANOGRAPHY TOOLS
Anahtar
BackYard
Blindside
BMP Secrets
bProtected® 2000
BuryBury
Camera/Shy
Camouflage
Cloak
Contraband - Hell Edition
Courier
Crypto 123
Dark Files
Data Stash
Digital Picture Envelope
Disk Hide
Dound
DPT 32
DriveCrypt
Drive Hider
Easy File & Folder Protector
EasyMemo
EmptyPic
EncryptPic
EzStego
F5
FFEncode
File Protector
Folder Guard™
GhostHost
Gif-it-up
Gifshuffle
GZSteg
Hide It
Hide4PGP
Hide Drive
Hide Drives
Hide Folders
Hide In Picture
Hide Me
Hide-Seek v.50
Info Stego
InPlainView
InThePicture
Invisible Files 2000 Pro
Invisible Secrets
JP Hide and Seek
Jsteg Shell
KPK File
Magic Folders
MASKER
MergeStreams
MP3 Stego
NICETEXT
NookMe
OutGuess
Palm Tree
Paranoid
PC FileSafe
Phototile
Picture Messenger
Point Lock PRO
PRETTY GOOD ENVELOPE
Private Info
Protector
RightClickHide
Sam's Big Playmaker
SandMark
Scramdisk
Secret Space
SecurDesk
Snow
Spammimmic
StealthDisk
Steghide
Steganosaurus
StegoTif
StegoWav
S-Tools
SysCop
Texto
WbStego
White Noise Storm
Latest and Greatest
Hydan

PRODUCTS AND COMPANIES
Alpha-Tech Ltd
AlpVision
BlueSpike
Compris
CenturionSoft
Central Research Laboratories
Data Dot Technologies Ltd
DataMark Technologies
Digimarc
eWatermarking
Intertrust
Macrovision
MarkAny
MediaSec Technologies
MTL Systems, Inc
SealTronic Technology, Inc.
Signum Technologies
Spectra Systems Corporation
Verance
WetStone Technologies - Stego Watch

REAL-WORLD USES
Medical Records
Workplace Communication
DNA Microdots
Monitoring of Radio Advertisements
PKI and Steganography
Digital Music
Intellectual Property Protection Systems
Digital Rights Management Systems
Intertrust
The Madison Project
Cryptolope
MagicGate and OpenMG
Systems Built on Encrypted MP3 files
MJuice
M-Trax
Key2Audio
Super Audio CD and DVD Audio
Recording Industry Association of America (RIAA)
Secure Digital Music Initiative (SDMI)
The MUSE Project
Steganography and the Internet
Terrorism and Foreign Interest
The Movie Industry
Steganographic File Systems

DETECTION AND ATTACKS
Detection
Attacks

THE FUTURE

GLOSSARY



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.