Investigator's Guide to Steganography: 1st Edition (Hardback) book cover

Investigator's Guide to Steganography

1st Edition

By Gregory Kipper

Auerbach Publications

240 pages | 74 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849324338
pub: 2003-10-27
$120.00
x


FREE Standard Shipping!

Description

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Table of Contents

INTRODUCTION

A BASIC UNDERSTANDING OF STEGANOGRAPHY

What is Steganography?

The Differences Between Steganography and Cryptography

The Differences Between Steganography and Watermarking

The Prisoner's Problem

Microdots

One-time Pads

Semagrams

Null Ciphers

Anamorphosis

Acrostics

Type Spacing and Offsetting

Spread Spectrum

Invisible Ink

Newspaper Code

Jargon Code

Grille's - Cardano's Grille

HISTORY

The Egyptians

The Greeks

Aeneas the Tactician

The Chinese

Gaspar Schott

Johannes Trithemius

Giovanni Porta

Girolamo Cardano

Blaise de Vigenere

Auguste Kerchoffs

Bishop John Wilkins

Mary Queen of Scots

The Culpers and George Washington

The Pigeon Post into Paris

Civil War Rugs

World War I

World War II

The USS Pueblo

The Vietnam War

US/USSR Nuclear Arms Treaties

Margaret Thatcher

STEGANOGRAPHY IN DEPTH

Steganography Techniques

The Six Categories of Steganography

Types of Steganography

Embedding Methods

Steganography Applied to Different Media

Attacks

WATERMARKING

History

Classification of Watermarks

Types of Watermarks

Reasons for Invisible Watermarking

Specific Watermarking Technologies

Requirements of a Robust Digital Watermark

Suitable Methods for Watermarking

Watermarks and Compression

Attacks

Fingerprinting

Summary

STEGANOGRAPHY TOOLS

Anahtar

BackYard

Blindside

BMP Secrets

bProtected® 2000

BuryBury

Camera/Shy

Camouflage

Cloak

Contraband - Hell Edition

Courier

Crypto 123

Dark Files

Data Stash

Digital Picture Envelope

Disk Hide

Dound

DPT 32

DriveCrypt

Drive Hider

Easy File & Folder Protector

EasyMemo

EmptyPic

EncryptPic

EzStego

F5

FFEncode

File Protector

Folder Guard™

GhostHost

Gif-it-up

Gifshuffle

GZSteg

Hide It

Hide4PGP

Hide Drive

Hide Drives

Hide Folders

Hide In Picture

Hide Me

Hide-Seek v.50

Info Stego

InPlainView

InThePicture

Invisible Files 2000 Pro

Invisible Secrets

JP Hide and Seek

Jsteg Shell

KPK File

Magic Folders

MASKER

MergeStreams

MP3 Stego

NICETEXT

NookMe

OutGuess

Palm Tree

Paranoid

PC FileSafe

Phototile

Picture Messenger

Point Lock PRO

PRETTY GOOD ENVELOPE

Private Info

Protector

RightClickHide

Sam's Big Playmaker

SandMark

Scramdisk

Secret Space

SecurDesk

Snow

Spammimmic

StealthDisk

Steghide

Steganosaurus

StegoTif

StegoWav

S-Tools

SysCop

Texto

WbStego

White Noise Storm

Latest and Greatest

Hydan

PRODUCTS AND COMPANIES

Alpha-Tech Ltd

AlpVision

BlueSpike

Compris

CenturionSoft

Central Research Laboratories

Data Dot Technologies Ltd

DataMark Technologies

Digimarc

eWatermarking

Intertrust

Macrovision

MarkAny

MediaSec Technologies

MTL Systems, Inc

SealTronic Technology, Inc.

Signum Technologies

Spectra Systems Corporation

Verance

WetStone Technologies - Stego Watch

REAL-WORLD USES

Medical Records

Workplace Communication

DNA Microdots

Monitoring of Radio Advertisements

PKI and Steganography

Digital Music

Intellectual Property Protection Systems

Digital Rights Management Systems

Intertrust

The Madison Project

Cryptolope

MagicGate and OpenMG

Systems Built on Encrypted MP3 files

MJuice

M-Trax

Key2Audio

Super Audio CD and DVD Audio

Recording Industry Association of America (RIAA)

Secure Digital Music Initiative (SDMI)

The MUSE Project

Steganography and the Internet

Terrorism and Foreign Interest

The Movie Industry

Steganographic File Systems

DETECTION AND ATTACKS

Detection

Attacks

THE FUTURE

GLOSSARY

Subject Categories

BISAC Subject Codes/Headings:
COM053000
COMPUTERS / Security / General