Table of Contents

Copyright

About the Author

Preface

Book Notes

A Start

Chapter 1. Framing Information

1.0.1. Reasons for Secrecy

1.0.2. How It Is Done

1.0.3. How Steganography Is Used

1.0.4. Attacks on Steganography

1.1. Adding Context

Chapter 2. Encryption

2.1. Pure White

2.2. Encryption and White Noise

2.2.1. DES and Modern Ciphers

2.2.2. Public-Key Encryption

2.2.3. How Random Is the Noise?

2.3. Measuring and Encrypting Information

2.3.1. RSA Encryption

2.4. Summary

Further Reading

Chapter 3. Error Correction

3.1. Close but No Cigar

3.2. Correcting Errors

3.2.1. Error Correction and White Noise

3.2.2. Error Correction and Secret Sharing

3.3. Constructing Error-Correcting Codes

3.3.1. Periodic Codes

3.4. Summary

Further Reading

Chapter 4. Secret Sharing

4.1. Two out of Three Musketeers

4.2. Splitting Up Secrets

4.2.1. Requiring All Parts

4.2.2. Letting Parts Slide

4.2.3. A More Efficient Method

4.2.4. Providing Deniability

4.3. Building Secret-Sharing Schemes

4.3.1. Making Some More Equal

4.4. Public-Key Secret Sharing

4.5. Steganographic File Systems and Secret Sharing

4.6. Summary

Chapter 5. Compression

5.1. Television Listing

5.2. Patterns and Compression

5.2.1. Huffman Coding

5.3. Building Compression Algorithms

5.3.1. Huffman Compression

5.3.2. Dictionary Compression

5.3.3. JPEG Compression

5.3.4. GZSteg

5.4. Summary

Further Reading

Chapter 6. Basic Mimicry

6.1. Reading between the Lines

6.2. Running in Reverse

6.2.1. Choosing the Next Letter

6.3. Implementing the Mimicry

6.3.1. Goosing with Extra Data

6.3.2. Regular Mimicry and Images

6.4. Summary

Further Reading

Chapter 7. Grammars and Mimicry

7.1. Evolution of Everyday Things

7.2. Using Grammar for Mimicry

7.2.1. Context-Free Grammars

7.2.2. Parsing and Going Back

7.2.3. How Good Is It?

7.3. Creating Grammar-Based Mimicry

7.3.1. Parsing the Output

7.3.2. Suggestions for Building Grammars

7.3.3. Scrambled Grammars

7.3.4. Assessing the Theoretical Security of Mimicry

7.3.5. Efficient Mimicry-Based Codes

7.4. Summary

Further Reading

Chapter 8. Turing and Reverse

8.1. Doggie's Little Get Along

8.2. Running Backward

8.2.1. Reversing Gears

8.3. Building a Reversible Machine

8.3.1. Reversible Turing Machines

8.3.2. Reversible Grammar Generators

8.3.3. The Reversible Grammar Machine

8.4. Summary

Further Reading

Chapter 9. Life in the Noise

9.1. Boy-Zs in Noizy, Idaho

9.2. Hiding in the Noise

9.2.1. Problems with the Noise

9.2.2. Good noise?

9.2.3. Independence Problems

9.2.4. File Format Grief

9.2.5. Deniability

9.2.6. Finding Edges

9.3. Bit Twiddling

9.3.1. Working with GIFs

9.3.2. Smarter Color Reduction

9.3.3. Sound Files

9.4. Random Walks and Subsets

9.4.1. Empty Disk Space

9.5. Putting JPEG to Use

9.5.1. Hiding Information in JPEG Files

9.5.2. Outguess

9.5.3. F4 and F5

9.6. Summary

Chapter 10. Anonymous Remailers

10.1. Dr. Anon to You

10.2. Anonymous Remailers

10.2.1. Enhancements

10.2.2. Using Remailers

10.2.3. Using Private Idaho

10.2.4. Web Remailers

10.3. Remailer Guts

10.3.1. Other Remailer Packages

10.3.2. Splitting Paths

10.4. Anonymous Networks

10.4.1. Freedom Network

10.4.2. PipeNet

10.4.3. Crowds

10.4.4. Freenet

10.4.5. OceanStore

10.5. Long term storage

10.5.1. Eternity Server

10.5.2. Entanglement

10.6. Publius

10.7. Onion Routing

10.7.1. Establishing a Circuit

10.7.2. More Indirection: Hidden Services

10.7.3. Stopping Bad Users

10.8. Anonymous Auction Protocols

10.9. The Future

10.10. Summary

Further Reading

Chapter 11. Secret Broadcasts

11.1. Table Talk

11.2. Secret Senders

11.3. Creating a DC Net

11.3.1. Cheating DC Nets

11.4. Summary

Further Reading

Chapter 12. Keys

12.1. The Key Vision

12.2. Extending Control

12.3. Signing Algorithms

12.4. Public-Key Algorithms

12.4.1. Leveraging Public-Key Cryptography

12.4.2. Constraining Hard Problems

12.4.3. Using Matrix Multiplication

12.4.4. Removing Parts

12.5. Zero Knowledge Approaches

12.5.1. Discrete Logs for Proofs

12.6. Collusion Control

12.7. Summary

Further Reading

Chapter 13. Ordering and Reordering

13.1. Top 10 Reasons Why Top 10 Lists Fail

13.2. Introduction

13.3. Strength Against Scrambling

13.4. Invariant Forms

13.5. Canonical Forms

13.6. Packing in Multiple Messages

13.7. Sorting to Hide Information

13.8. Word Scrambling

13.9. Adding Extra Packets

13.10. Port Knocking

13.10.1. Enhancing Port Knocking

13.11. Continuous Use and Jamming

13.12. Summary

Further Reading

Chapter 14. Spreading

14.1. A New Job

14.2. Spreading the Information

14.3. Going Digital

14.3.1. An example

14.3.2. Synchronization

14.3.3. Strengthening the System

14.3.4. Packing Multiple Messages

14.4. Comparative Blocks

14.4.1. Minimizing Quantization Errors

14.4.2. Perturbed Quantization

14.5. Fast Fourier Solutions

14.5.1. Some Brief Calculus

14.6. The Fast Fourier Transform

14.7. Hiding Information with FFTs and DCTs

14.7.1. Tweaking a Number of Coefficients

14.7.2. Removing the Original from the Detection Process

14.7.3. Tempering the Wake

14.8. Wavelets

14.9. Modifications

14.10. Summary

Further Reading

Chapter 15. Synthetic Worlds

15.1. Slam Dunks

15.2. Created Worlds

15.3. Text Position Encoding and OCR

15.3.1. Positioning

15.3.2. MandelSteg and Secrets

15.4. Echo Hiding

15.5. Summary

Further Reading

Chapter 16. Watermarks

16.1. A Patent for Watermarking Humans

16.2. Tagging Digital Documents

16.2.1. A Watermarking Taxonomy

16.3. A Basic Watermark

16.3.1. Choosing the Coefficients

16.4. An Averaging Watermark

16.4.1. Effects of Distortion

16.4.2. Birthday Marks

16.5. Summary

Further Reading

Chapter 17. Steganalysis

17.1. Code Words

17.2. Finding Hidden Messages

17.3. Typical Approaches

17.4. Visual and Aural Attacks

17.4.1. Visual Attacks

17.4.2. Aural Attacks

17.5. Structural Attacks

17.5.1. Interpolated Images

17.6. Statistical Attacks

17.6.1. Wavelet Statistics

17.6.2. Re-alignment

17.7. Summary

Further Reading

Chapter 18. Obfuscation

18.1. Regulation

18.2. Code Rearrangement

18.3. Compiling Intelligence

18.4. Real Tools

18.5. Summary

Further Reading

Chapter 19. Synchronization

19.1. Stealing Baseball's Signs

19.2. Getting In Sync

19.3. Extending Other Tools

19.4. Summary

Further Reading

Chapter 20. Translucent Databases

20.1. Missed Connections

20.2. Hiding In Databases

20.2.1. One-way Functions

20.3. Using Strong One-Way Functions

20.3.1. One-Way Functions and Steganography

20.4. Summary

Further Reading

Chapter 21. Plain Sight

21.1. Laughtracks

21.2. Hiding in the Open

21.3. Other Formats

21.3.1. Microformats

21.3.2. Rice's Theorem

21.4. Summary

Further Reading

Chapter 22. Coda

Appendix A. Software

A.1. Commercial Packages

A.2. Open Packages

A.3. Steganalysis Software

Appendix Bibliographic Notes

 Bibliography

Bibliography

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.69.172