Information hiding in communication networks : (Record no. 74440)

000 -LEADER
fixed length control field 08016nam a2200805 i 4500
001 - CONTROL NUMBER
control field 7434879
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712205927.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160412s2016 nju ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119081715
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 00 - TITLE STATEMENT
Title Information hiding in communication networks :
Sub Title fundamentals, mechanisms, applications, and countermeasures /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (325 pages).
490 1# - SERIES STATEMENT
Series statement IEEE Press Series on Information and Communication Networks Security
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications
505 8# - FORMATTED CONTENTS NOTE
Remark 2 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary
505 8# - FORMATTED CONTENTS NOTE
Remark 2 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement
520 ## - SUMMARY, ETC.
Summary, etc Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert communication channels. . Highlights development trends and potential future directions of Information Hiding. Introduces a new classification and taxonomy for modern data hiding techniques. Presents different types of network steganography mechanisms. Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services This book is intended for academics, graduate students, professionals, and researchers working in the fields of network security, networking, and communications. Wojciech Mazurczyk is an Associate Professor at the Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University, Poland. He is also a senior member of IEEE. Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Computer networks
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Mazurczyk, Wojciech.
700 1# - AUTHOR 2
Author 2 Wendzel, Steffen.
700 1# - AUTHOR 2
Author 2 Zander, Sebastian.
700 1# - AUTHOR 2
Author 2 Houmansadr, Amir.
700 1# - AUTHOR 2
Author 2 Szczypiorski, Krzysztof.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7434879
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- Wiley,
-- 2016.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2016]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 04/12/2016.
695 ## -
-- Computers
695 ## -
-- Cryptography
695 ## -
-- Delays
695 ## -
-- Hair
695 ## -
-- IP networks
695 ## -
-- Joining processes
695 ## -
-- Manganese
695 ## -
-- Protocols
695 ## -
-- Receivers
695 ## -
-- Reliability
695 ## -
-- Robustness
695 ## -
-- Security
695 ## -
-- Silicon
695 ## -
-- Skin
695 ## -
-- Watermarking

No items available.