Exploring steganography: Seeing the unseen
Neil F. Johnson,Sushil Jajodia +1 more
Reads0
Chats0
TLDR
It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.Abstract:
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spycraft family: cryptography scrambles a message so it cannot be understood while steganography hides the message so it cannot be seen. In this article the authors discuss image files and how to hide information in them, and discuss results obtained from evaluating available steganographic software. They argue that steganography by itself does not ensure secrecy, but neither does simple encryption. If these methods are combined, however, stronger encryption methods result. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. But with steganography, the interceptor may not know that a hidden message even exists. For a brief look at how steganography evolved, there is included a sidebar titled "Steganography: Some History."read more
Citations
More filters
Book
Digital Watermarking and Steganography
TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI
Hide and seek: an introduction to steganography
Niels Provos,Peter Honeyman +1 more
TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Journal ArticleDOI
A steganographic method for images by pixel-value differencing
Da-Chun Wu,Wen-Hsiang Tsai +1 more
TL;DR: A new and efficient steganographic method for embedding secret messages into a gray-valued cover image that provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods.
Journal ArticleDOI
Detecting LSB steganography in color, and gray-scale images
TL;DR: In this article, a reliable and accurate method for detecting least significant bit (LSB) nonsequential embedding in digital images is described. But this method relies on the assumption that the secret message length is derived by inspecting the lossless capacity in the LSB and shifted LSB plane.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Book ChapterDOI
A Secure, Robust Watermark for Multimedia
TL;DR: A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Proceedings ArticleDOI
A multiresolution watermark for digital images
TL;DR: A new multiresolution watermarking method based on the discrete wavelet transform (DWT), where Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image.
Proceedings ArticleDOI
A cautionary note on image downgrading
C. Kurak,John McHugh +1 more
TL;DR: The results of an experiment show that it is very simple to contaminate digital images with information that can later be extracted and that image downgrading based on visual display of the image to be downgraded not be performed if there is any threat of image contamination by Trojan horse programs.