scispace - formally typeset
Open AccessJournal ArticleDOI

Exploring steganography: Seeing the unseen

Neil F. Johnson, +1 more
- 01 Feb 1998 - 
- Vol. 31, Iss: 2, pp 26-34
Reads0
Chats0
TLDR
It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Abstract
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spycraft family: cryptography scrambles a message so it cannot be understood while steganography hides the message so it cannot be seen. In this article the authors discuss image files and how to hide information in them, and discuss results obtained from evaluating available steganographic software. They argue that steganography by itself does not ensure secrecy, but neither does simple encryption. If these methods are combined, however, stronger encryption methods result. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. But with steganography, the interceptor may not know that a hidden message even exists. For a brief look at how steganography evolved, there is included a sidebar titled "Steganography: Some History."

read more

Citations
More filters
Book

Digital Watermarking and Steganography

TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

Hide and seek: an introduction to steganography

TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Journal ArticleDOI

A steganographic method for images by pixel-value differencing

TL;DR: A new and efficient steganographic method for embedding secret messages into a gray-valued cover image that provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods.
Journal ArticleDOI

Detecting LSB steganography in color, and gray-scale images

TL;DR: In this article, a reliable and accurate method for detecting least significant bit (LSB) nonsequential embedding in digital images is described. But this method relies on the assumption that the secret message length is derived by inspecting the lossless capacity in the LSB and shifted LSB plane.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Book ChapterDOI

A Secure, Robust Watermark for Multimedia

TL;DR: A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Proceedings ArticleDOI

A multiresolution watermark for digital images

TL;DR: A new multiresolution watermarking method based on the discrete wavelet transform (DWT), where Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image.
Proceedings ArticleDOI

A cautionary note on image downgrading

TL;DR: The results of an experiment show that it is very simple to contaminate digital images with information that can later be extracted and that image downgrading based on visual display of the image to be downgraded not be performed if there is any threat of image contamination by Trojan horse programs.