Investigators Guide to Steganography

A

Acids, 12

ACK (acknowledgement) packet, 67, 73

Acrostics, 10

Active attacks, 7, 77–80, 193–196

Additive noise, 93, 197

Advanced Digital Watermarking (ADW) tool, 159

neas, 17–18

AlbumDirect.com, 171–172

Along Came a Spider (motion picture), 108

Alpha-Tech Ltd., 147

AlpVision, 148–149

Al Qaeda, 180–182

Alum, 22

Ambiguity attack, 92

Ammonia salts, 22

Anahtar (steganography software), 99

Analog protection system (APS), 184

Analog-to-digital conversion, 83, 92

Analyze Disk option (S-Tools), 61, 140

Anamorphosis, 9–10

Angels, names of, 19

ANSI text files, 145

Anti-soft bots, 93, 197

Anti-theft identification technology, 153–154

Appended spaces, 190

Appendx, 187

Application proxy firewall, 75

APS (analog protection system), 184

Aristagoras, 17

Arm treaties, 34

ArtistDirect, 176

ASCII text files, 130, 145

Athens, 16–17

Attackers, 96

Attacks, 76–77

classification of, 91–92

steganography, 191–196

watermark, 196–198

Audio files, 54–56

as digital cover, 39

watermarking of, 147–148

AudioMark (watermarking software), 147–148

AudioSoft, 177

Audio Watermarking technology, 153

Authorized users, 96

Ave Maria cipher, 19

.Avi files, 54

Категории