Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Chapter

      NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY
      loading

      Chapter

      NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY

      DOI link for NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY

      NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY book

      NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY

      DOI link for NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY

      NOTESTEGA : Notes-Based STEGANOGRAPHY METHODOLOGY book

      ByAbdelrahman Desoky
      BookNoiseless Steganography

      Click here to navigate to parent product.

      Edition 1st Edition
      First Published 2012
      Imprint Auerbach Publications
      Pages 12
      eBook ISBN 9780429063213
      Share
      Share

      ABSTRACT

      To illustrate how Notestega can be used, consider the following scenario. Bob and Alice are on a spy mission. Before they start their mission, which requires them to reside in two different countries, they set the rules for communicating covertly using their professions as a justification. To make this work, they establish a business relationship as follows. Bob and Alice are students in two different schools, but taking the same course and they agree to use Notestega. is is like an online forum when students from different schools all over the world discuss a particular subject and exchange class notes. Bob and Alice generate notes concerning real topics to make their covert communications more legitimate. When Bob wants to send a covert message to Alice, Bob either posts notes online for authorized classmates

      or online student friends, or he send the notes to them via email. ese notes conceal data. Covert messages transmitted in this manner will not look suspicious because Bob and Alice are students and their interaction is legitimate. e use of notes in both academic and nonacademic spheres is natural given the time pressure experienced by people nowadays. is renders the activity innocent. Furthermore, Bob and Alice are not the sole recipients. Other non-spy students send and receive such notes, further warding off suspicion. However, only Bob and Alice will be able to unravel the hidden message because they know the rules of the game.

      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited