Signal Conditioning pp 275-295 | Cite as
Steganography: Secret Data Hiding in Multimedia
Chapter
First Online:
Abstract
Steganography is the technique of hiding confidential information within multi-media. People often get confused among steganography and cryptography because both of them are similar in the way that they are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention
Keywords
Cover Image Markov Random Field Intrusion Detection System Secret Message Secret Image
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
- 1.Dunbar, B.: Steganographic Techniques and their Use in an Open-Systems Environment. The Information Security Reading Room, SANS Institute (2002)Google Scholar
- 2.Stanley, C.A.: Pairs of values and the chi-squared attack. Master’s Thesis, Department of Mathematics, Iowa State University (2005)Google Scholar
- 3.Das, A.: Digital Communication—Principles and System Modelling. Springer, (2010)Google Scholar
- 4.Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proceedings of Workshop on Multimedia and Security at ACM Multimedia, Juan-les-Pins, France, 6 Dec 2002Google Scholar
- 5.Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Privacy Mag. 1(3), 32–44 (2003) CrossRefGoogle Scholar
- 6.Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998). (George Mason University)CrossRefGoogle Scholar
- 7.RFC793—Transmission control protocol, September (1981)Google Scholar
- 8.Mazumdar, D., Mitra, S., Dhali, S., Pal, S.K.: A chosen plaintext steganalysis of hide 4PGP v 2.0. In: Pal, S.K., Bandyopadhyay, S., Biswas, S. (eds.) PReMI 2005. LNCS, vol. 3776, pp. 459–464. Springer, Heidelberg (2005)Google Scholar
- 9.Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 1, 41–56 (2004)MathSciNetCrossRefGoogle Scholar
- 10.Mazumdar, D., Das, A., Pal, S.K.: MRF based LSB steganalysis–a new measure of steganography capacity. In: PREMI’2009, LNCS-Springer, pp. 420–425Google Scholar
- 11.Chandramouli, R., Kharrazzi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Lecture Notes in Computer Science, vol. 2939, Springer-Verlag (2004)Google Scholar
- 12.Besag, J.E.: Spetial interaction and the statistical analysis of lattice system. J. Roy. Statis. Soc. B 36, 192–336 (1974)MathSciNetMATHGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2012