Abstract
Steganography is the technique of hiding confidential information within multi-media. People often get confused among steganography and cryptography because both of them are similar in the way that they are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dunbar, B.: Steganographic Techniques and their Use in an Open-Systems Environment. The Information Security Reading Room, SANS Institute (2002)
Stanley, C.A.: Pairs of values and the chi-squared attack. Master’s Thesis, Department of Mathematics, Iowa State University (2005)
Das, A.: Digital Communication—Principles and System Modelling. Springer, (2010)
Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proceedings of Workshop on Multimedia and Security at ACM Multimedia, Juan-les-Pins, France, 6 Dec 2002
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Privacy Mag. 1(3), 32–44 (2003)
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998). (George Mason University)
RFC793—Transmission control protocol, September (1981)
Mazumdar, D., Mitra, S., Dhali, S., Pal, S.K.: A chosen plaintext steganalysis of hide 4PGP v 2.0. In: Pal, S.K., Bandyopadhyay, S., Biswas, S. (eds.) PReMI 2005. LNCS, vol. 3776, pp. 459–464. Springer, Heidelberg (2005)
Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 1, 41–56 (2004)
Mazumdar, D., Das, A., Pal, S.K.: MRF based LSB steganalysis–a new measure of steganography capacity. In: PREMI’2009, LNCS-Springer, pp. 420–425
Chandramouli, R., Kharrazzi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Lecture Notes in Computer Science, vol. 2939, Springer-Verlag (2004)
Besag, J.E.: Spetial interaction and the statistical analysis of lattice system. J. Roy. Statis. Soc. B 36, 192–336 (1974)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Das, A. (2012). Steganography: Secret Data Hiding in Multimedia. In: Signal Conditioning. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28818-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-28818-0_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28274-4
Online ISBN: 978-3-642-28818-0
eBook Packages: EngineeringEngineering (R0)