Advertisement

Steganography and Steganalysis

  • Xiaodong Lin
Chapter

Abstract

The objectives of this chapter are to:

References

  1. 1.
    A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods.” Signal Processing, 2010, vol. 90, no. 3, pp. 727–752, March 2010CrossRefGoogle Scholar
  2. 2.
    C. Hosmer and C. Hyde. Discovering covert digital evidence. Digital Forensic Research Workshop (DFRWS) 2003, August 2003 [Online]. (January 4, 2004). Available: http://www.dfrws.org/dfrws2003/presentations/Paper-Hosmer-digitalevidence.pdf
  3. 3.
    Jordan Green, Ian Levstein, Robert J. Boggs, Terry Fenger. Steganography Analysis: Efficacy and Response-Time of Current Steganalysis Software. http://www.marshall.edu/forensics/files/GreenJordan_Research-Paper_08_07_20141.pdf
  4. 4.
    A. Whitehead, “Towards Eliminating Steganographic Communication”, Proc. International Conference on Privacy, Security and Trust (PST), October 12-14, 2005, New Brunswick, CanadaGoogle Scholar
  5. 5.
    A. K. Shukla, “Data Hiding in Digital Images”, A Review[C] STEG’04: Pacific Rim Workshop on Digital Steganography, 2004Google Scholar
  6. 6.
    W. R. Bender, D. Gruhl, N. Morimoto, “Techniques for data hiding.” IS&T/SPIE’s Symposium on Electronic Imaging: Science & Technology International Society for Optics and Photonics, 1995, vol. 35, NOS. 3&4, pp. 313-336CrossRefGoogle Scholar
  7. 7.
    P. Hayati, V. Potdar, E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator.” http://www.pedramhayati.com/images/docs/survey_of_steganography_and_steganalytic_tools.pdf
  8. 8.
    W. R. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, 1996CrossRefGoogle Scholar
  9. 9.
    G. C. Kessler, “An Overview of Steganography for the Computer Forensics Examiner”, Forensic Science Communications, 2004Google Scholar
  10. 10.
    M. Bachrach and F. Y. Shih, “Image Steganography and Steganalysis”, Wiley Interdisciplinary Reviews Computational Statistics, 2011, vol. 3, pp. 251-259CrossRefGoogle Scholar
  11. 11.
    G. L. Smitha, E. Baburaj, “A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm.” Proc. International Conference on Emerging Technological Trends, 2016Google Scholar
  12. 12.
    W. Luo, F. Huang, J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited.” IEEE Transactions on Information Forensics & Security, 2010, pp. 201-214Google Scholar
  13. 13.
    J. Harmsen, W. Pearlman, “Steganalysis of additive-noise modelable information hiding”, Spie Processing, 2003, 5020:131-142Google Scholar
  14. 14.
    J. Mielikainen, “LSB Matching Revisited”, IEEE Signal Processing Letters, 2006, vol. 13, no. 5, pp. 285-287CrossRefGoogle Scholar
  15. 15.
    R. J. Anderson, “Stretching the Limits of Steganography.” International Workshop on Information Hiding Springer-Verlag, 1996, vol. 1174, no. 4, pp. 39-48CrossRefGoogle Scholar
  16. 16.
    C. C. Chang, T. S. Chen, and L. Z. Chung. “A steganographic Method Based Upon JPEG and Quantization Table Modification.” Information Sciences, 2002, vol. 141, no. 1–2, pp. 123-138CrossRefGoogle Scholar
  17. 17.
    List of 10 Best Steganography Tools to Hide Data. https://www.geekdashboard.com/best-steganography-tools/#openstego
  18. 18.
    B. Li, J. He, J. Huang, Y. Shi, A survey on image steganography and steganalysis, Department of Computing, vol. 2, no. 3, pp. 288-289, 2011Google Scholar
  19. 19.
    I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics”, IEEE Trans. Image Process., vol. 12, no. 2, pp. 221-229, 2003MathSciNetCrossRefGoogle Scholar
  20. 20.
    X. Luo, F. Liu, S. Lian, C. Yang, S. Gritzalis, “On the Typical Statistic Features for Image Blind Steganalysis.” IEEE Journal on Selected Areas in Communications, 2011, vol. 29, no. 7, pp. 1404-1422CrossRefGoogle Scholar
  21. 21.
    M. U. Celik, G. Sharma, and A. M. Tekalp, “Universal Image Steganalysis Using Rate-Distortion Curves”, Proc. Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 467-476, San Jose, California, USA, 2004Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Xiaodong Lin
    • 1
  1. 1.Department of Physics and Computer Science, Faculty of ScienceWilfrid Laurier UniversityWaterlooCanada

Personalised recommendations