Steganography: Secret Data Hiding in Multimedia

  • Apurba Das
Part of the Signals and Communication Technology book series (SCT)


Steganography is the technique of hiding confidential information within multi-media. People often get confused among steganography and cryptography because both of them are similar in the way that they are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention


Cover Image Markov Random Field Intrusion Detection System Secret Message Secret Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Dunbar, B.: Steganographic Techniques and their Use in an Open-Systems Environment. The Information Security Reading Room, SANS Institute (2002)Google Scholar
  2. 2.
    Stanley, C.A.: Pairs of values and the chi-squared attack. Master’s Thesis, Department of Mathematics, Iowa State University (2005)Google Scholar
  3. 3.
    Das, A.: Digital Communication—Principles and System Modelling. Springer, (2010)Google Scholar
  4. 4.
    Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proceedings of Workshop on Multimedia and Security at ACM Multimedia, Juan-les-Pins, France, 6 Dec 2002Google Scholar
  5. 5.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Privacy Mag. 1(3), 32–44 (2003) CrossRefGoogle Scholar
  6. 6.
    Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998). (George Mason University)CrossRefGoogle Scholar
  7. 7.
    RFC793—Transmission control protocol, September (1981)Google Scholar
  8. 8.
    Mazumdar, D., Mitra, S., Dhali, S., Pal, S.K.: A chosen plaintext steganalysis of hide 4PGP v 2.0. In: Pal, S.K., Bandyopadhyay, S., Biswas, S. (eds.) PReMI 2005. LNCS, vol. 3776, pp. 459–464. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 1, 41–56 (2004)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Mazumdar, D., Das, A., Pal, S.K.: MRF based LSB steganalysis–a new measure of steganography capacity. In: PREMI’2009, LNCS-Springer, pp. 420–425Google Scholar
  11. 11.
    Chandramouli, R., Kharrazzi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Lecture Notes in Computer Science, vol. 2939, Springer-Verlag (2004)Google Scholar
  12. 12.
    Besag, J.E.: Spetial interaction and the statistical analysis of lattice system. J. Roy. Statis. Soc. B 36, 192–336 (1974)MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Image Processing Lab CDAC, KolkattaMinistry of Communication and ITKolkattaIndia
  2. 2.Imaging Tech Lab, Engineering and R&DHCL Technologies Ltd.ChennaiIndia

Personalised recommendations