Home | Introduction to Steganography | Mod4 vs F5 | How M4JPEG Works | M4JPEG Download | Matlab JPEG Toolbox
 
 
 

Information Hiding
and its Applications
Steganography and Watermarking
A detailed look at Steganography
   ◦ Text Steganography
   ◦ Hypertext Steganography
   ◦ Audio Steganography
   ◦ Image Steganography
   ◦ Steganography in Open System
Image Steganography Techniques
   ◦ Spatial Domain LSB Insertion
   ◦ Masking and Filtering
   ◦ DCT-based Steganography
   ◦ Wavelet-based Steganography
How to Detect Steganography
   ◦ Blind Detection
   ◦ Analytical Detection





 

• Overview Papers and Articles about Steganography and Steganalysis.
• Articles and Papers about Image-based Steganography Methods.
• Theses about Steganography and Steganalysis.
• Articles and Papers about Steganalysis.


Overview Papers and Articles about Steganography and Steganalysis

• An Overview of Steganography, Shawn D. Dickman, July 2007.
• A review on blind detection for image steganography, Xiang-Yang Luo, Dao-Shun Wang, Ping Wang, Fen-Lin Liu.


Articles and Papers about Image-based Steganography Methods

• F5 - A Steganographic Algorithm, Andreas Westfeld, 2001.
• OutGuess: Defending Against Statistical Steganalysis, Niels Provos.
• Model-Based Steganography, Phil Sallee, 2004.
• A Secure Steganographic Method on Wavelet Domain of Palette-Based Images,
  by Wei Ding, Xiang-Wei Kong, Xin-Gang You, and Zi-Ren Wang, 2004.
• An Adaptive DCT-Based Mod-4 Steganographic Method, Xiaojun Qi, KokSheik Wong, 2005.
• Hiding Data in Binary Images, Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin, 2005.
• Quantization-Based Image Steganography without Data Hiding Position Memorization, Yusuke SEKI, Hiroyuki KOBAYASHI,
  Masaaki FUJIYOSHI, Hitoshi KIYA, 2005.
• A DCT-based Mod4 steganographic method, KokSheik Wong, Xiaojun Qi, Kiyoshi Tanaka, 2007.
• PM1 steganography in JPEG images using genetic algorithm, Lifang Yu, Yao Zhao, Rongrong Ni, Zhenfeng Zhu, 2008.


Theses about Steganography and Steganalysis

• Image Steganography for Hidden Communication, by Lisa M. Marvel, 1999.
• Robust Techniques for Hiding Data in Images and Video, by Jong Jin Chae, 2000.
• Information Hiding in Digital Images: Watermarking and Steganography, by Po-Chyi Su, 2003.
• Image Data Hiding, by Zhicheng Ni, 2005.


Articles and Papers about Steganalysis

• A Mathematical Analysis of the DCT Coefficient Distributions for Images, by Edmund Y. Lam and Joseph W. Goodman, 2000.
• Steganalysis Using Image Quality Metrics, by Ismail Avcıbas, Nasir Memon and Bόlent Sankur, 2003.
• Steganalysis of JPEG Images: Breaking the F5 Algorithm, by Jessica Fridrich, Miroslav Goljan, Dorin Hogea.
• Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, by Jessica
  Fridrich, 2004.
• Steganalysis Using Higher-Order Image Statistics, by Siwei Lyu and Hany Farid, 2006.
• Universal Detection of JPEG Steganography, by Johann Barbier, Eric Filiol, Kichenakoumar Mayoura, 2007.

Home | Introduction to Steganography | Mod4 vs F5 | How M4JPEG Works | M4JPEG Download | Matlab JPEG Toolbox