Skip to main content

Steganography and Steganalysis

  • Chapter
  • First Online:
Introductory Computer Forensics

Abstract

The objectives of this chapter are to:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods.” Signal Processing, 2010, vol. 90, no. 3, pp. 727–752, March 2010

    Article  Google Scholar 

  2. C. Hosmer and C. Hyde. Discovering covert digital evidence. Digital Forensic Research Workshop (DFRWS) 2003, August 2003 [Online]. (January 4, 2004). Available: http://www.dfrws.org/dfrws2003/presentations/Paper-Hosmer-digitalevidence.pdf

  3. Jordan Green, Ian Levstein, Robert J. Boggs, Terry Fenger. Steganography Analysis: Efficacy and Response-Time of Current Steganalysis Software. http://www.marshall.edu/forensics/files/GreenJordan_Research-Paper_08_07_20141.pdf

  4. A. Whitehead, “Towards Eliminating Steganographic Communication”, Proc. International Conference on Privacy, Security and Trust (PST), October 12-14, 2005, New Brunswick, Canada

    Google Scholar 

  5. A. K. Shukla, “Data Hiding in Digital Images”, A Review[C] STEG’04: Pacific Rim Workshop on Digital Steganography, 2004

    Google Scholar 

  6. W. R. Bender, D. Gruhl, N. Morimoto, “Techniques for data hiding.” IS&T/SPIE’s Symposium on Electronic Imaging: Science & Technology International Society for Optics and Photonics, 1995, vol. 35, NOS. 3&4, pp. 313-336

    Article  Google Scholar 

  7. P. Hayati, V. Potdar, E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator.” http://www.pedramhayati.com/images/docs/survey_of_steganography_and_steganalytic_tools.pdf

  8. W. R. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, 1996

    Article  Google Scholar 

  9. G. C. Kessler, “An Overview of Steganography for the Computer Forensics Examiner”, Forensic Science Communications, 2004

    Google Scholar 

  10. M. Bachrach and F. Y. Shih, “Image Steganography and Steganalysis”, Wiley Interdisciplinary Reviews Computational Statistics, 2011, vol. 3, pp. 251-259

    Article  Google Scholar 

  11. G. L. Smitha, E. Baburaj, “A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm.” Proc. International Conference on Emerging Technological Trends, 2016

    Google Scholar 

  12. W. Luo, F. Huang, J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited.” IEEE Transactions on Information Forensics & Security, 2010, pp. 201-214

    Google Scholar 

  13. J. Harmsen, W. Pearlman, “Steganalysis of additive-noise modelable information hiding”, Spie Processing, 2003, 5020:131-142

    Google Scholar 

  14. J. Mielikainen, “LSB Matching Revisited”, IEEE Signal Processing Letters, 2006, vol. 13, no. 5, pp. 285-287

    Article  Google Scholar 

  15. R. J. Anderson, “Stretching the Limits of Steganography.” International Workshop on Information Hiding Springer-Verlag, 1996, vol. 1174, no. 4, pp. 39-48

    Chapter  Google Scholar 

  16. C. C. Chang, T. S. Chen, and L. Z. Chung. “A steganographic Method Based Upon JPEG and Quantization Table Modification.” Information Sciences, 2002, vol. 141, no. 1–2, pp. 123-138

    Article  Google Scholar 

  17. List of 10 Best Steganography Tools to Hide Data. https://www.geekdashboard.com/best-steganography-tools/#openstego

  18. B. Li, J. He, J. Huang, Y. Shi, A survey on image steganography and steganalysis, Department of Computing, vol. 2, no. 3, pp. 288-289, 2011

    Google Scholar 

  19. I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics”, IEEE Trans. Image Process., vol. 12, no. 2, pp. 221-229, 2003

    Article  MathSciNet  Google Scholar 

  20. X. Luo, F. Liu, S. Lian, C. Yang, S. Gritzalis, “On the Typical Statistic Features for Image Blind Steganalysis.” IEEE Journal on Selected Areas in Communications, 2011, vol. 29, no. 7, pp. 1404-1422

    Article  Google Scholar 

  21. M. U. Celik, G. Sharma, and A. M. Tekalp, “Universal Image Steganalysis Using Rate-Distortion Curves”, Proc. Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 467-476, San Jose, California, USA, 2004

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X. (2018). Steganography and Steganalysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00581-8_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00580-1

  • Online ISBN: 978-3-030-00581-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics