scispace - formally typeset
Topic

Steganography

About: Steganography is a(n) research topic. Over the lifetime, 11214 publication(s) have been published within this topic receiving 161523 citation(s).

...read more

Papers
  More

Journal ArticleDOI: 10.1147/SJ.353.0313
Abstract: Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.

...read more

Topics: Steganography tools (57%), Steganography (56%), Information hiding (55%) ...read more

2,947 Citations


Open accessBook
31 Dec 1999-
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

...read more

Topics: Digital Watermarking Alliance (67%), Steganography tools (67%), Steganography (64%) ...read more

1,725 Citations


Open accessBook
23 Nov 2007-
Abstract: Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

...read more

Topics: Digital Watermarking Alliance (67%), Steganography tools (67%), Steganography (63%) ...read more

1,700 Citations


Open accessJournal ArticleDOI: 10.1016/J.SIGPRO.2009.08.010
01 Mar 2010-Signal Processing
Abstract: Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science it can be used for ill intentions. It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed.

...read more

  • Table 1 Comparison of steganography, watermarking and encryption.
    Table 1 Comparison of steganography, watermarking and encryption.
  • Fig. 1. The different embodiment disciplines of information hiding. The arrow
    Fig. 1. The different embodiment disciplines of information hiding. The arrow
  • Fig. 2. Media TV channels usually have their logos watermark for their broadcasting.
    Fig. 2. Media TV channels usually have their logos watermark for their broadcasting.
  • Fig. 4. Concealment of Morse code (1945). The hidden information is encoded onto the grass length alongside the river [8].
    Fig. 4. Concealment of Morse code (1945). The hidden information is encoded onto the grass length alongside the river [8].
  • Fig. 5. Fujitsu exploitation of steganography: (a) a sketch representing the concept and (b) the idea deployed into a mobile phone shown at an exhibition recently.3
    Fig. 5. Fujitsu exploitation of steganography: (a) a sketch representing the concept and (b) the idea deployed into a mobile phone shown at an exhibition recently.3
  • + 26

Topics: Steganography tools (74%), Steganography (66%), Steganalysis (62%) ...read more

1,410 Citations


Journal ArticleDOI: 10.1109/49.668971
Abstract: In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.

...read more

Topics: Steganography tools (61%), Steganography (57%), Secrecy (55%) ...read more

1,231 Citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202218
2021658
2020816
2019903
2018870
2017769

Top Attributes

Show by:

Topic's top 5 most impactful authors

Chin-Chen Chang

116 papers, 4.1K citations

Jessica Fridrich

101 papers, 13.4K citations

Xinpeng Zhang

58 papers, 1.5K citations

Wojciech Mazurczyk

57 papers, 1.5K citations

Xianfeng Zhao

50 papers, 449 citations

Network Information
Related Topics (5)
Encryption

98.3K papers, 1.4M citations

90% related
Authentication

74.7K papers, 867.1K citations

90% related
Digital watermarking

26.3K papers, 390.4K citations

90% related
Hash function

31.5K papers, 538.5K citations

89% related
Intrusion detection system

28.4K papers, 509.5K citations

88% related