Information Hiding
and its Applications
Steganography and Watermarking
A detailed look at Steganography
◦ Text Steganography
◦ Hypertext Steganography
◦ Audio Steganography
◦ Image Steganography
◦ Steganography in Open System
Image Steganography Techniques
◦ Spatial Domain LSB Insertion
◦ Masking and Filtering
◦ DCT-based Steganography
◦ Wavelet-based Steganography
How to Detect Steganography
◦ Blind Detection
◦ Analytical Detection
|
|
•
Overview Papers and Articles about Steganography
and Steganalysis.
• Articles and Papers about Image-based
Steganography Methods.
• Theses about Steganography and Steganalysis.
• Articles and Papers about Steganalysis. |
Overview Papers and Articles about Steganography
and Steganalysis
•
An
Overview of Steganography, Shawn D. Dickman,
July 2007.
•
A review on blind detection for image
steganography, Xiang-Yang Luo, Dao-Shun Wang,
Ping Wang, Fen-Lin Liu.
|
An
Overview of Steganography
By
Shawn D. Dickman, James Madison University, July
2007 |
|
ABSTRACT:
Steganography is a useful tool that allows
covert transmission of information over an overt
communications channel. Combining covert channel
exploitation with the encryption methods of
substitution ciphers and/or one time pad
cryptography, steganography enables the user to
transmit information masked inside of a file in
plain view. The hidden data is both difficult to
detect and when combined with known encryption
algorithms, equally difficult to decipher. This
paper provides a general overview of the
following subject areas: historical cases and
examples using steganography, how steganography
works, what steganography software is
commercially available and what data types are
supported, what methods and automated tools are
available to aide computer forensic
investigators and information security
professionals in detecting the use of
steganography, after detection has occurred, can
the embedded message be reliably extracted, can
the embedded data be separated from the carrier
revealing the original file, and finally, what
are some methods to defeat the use of
steganography even if it cannot be reliably
detected. |
A
Review on Blind Detection for Image
Steganography
By
Xiang-Yang Luo a,b, , Dao-Shun Wang b, Ping Wang
a, Fen-Lin Liu a
|
|
ABSTRACT:
Blind steganalysis techniques detect the
existence of secret messages embedded in digital
media when the steganography embedding algorithm
is unknown. This paper presents a survey of
blind steganalysis methods for digital images.
First, a principle framework is described for
image blind steganalysis, which includes four
parts: image pretreatment, feature extraction,
classifier selection and design, and
classification. We then classify the existing
blind detection methods into two categories
according to the development of feature
extraction and classifier design. For the first
category, we survey the principles of six kinds
of typical feature extraction methods, describe
briefly the algorithms of features extraction of
these methods, and compare the performances of
some typical feature extraction algorithms by
employing the Bhattacharyya distance. For the
second category, the development of classifier
design, we make a survey on various
classification algorithms used in existing blind
detection methods, and detail the algorithms
behind several classifiers based on multivariate
regression analysis, OC-SVM, ANN, CIS and
Hyper-geometric structure. Finally, some open
problems in this field are discussed, and some
interesting directions that may be worth
researching in the future are indicated. |
|