Digital Media Steganography
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

  1. 386 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

Book details
Book preview
Table of contents
Citations

About This Book

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

  • Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography
  • Provides new theoretical breakthroughs and a number of modern techniques in steganography
  • Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Digital Media Steganography an online PDF/ePUB?
Yes, you can access Digital Media Steganography by Mahmoud Hassaballah in PDF and/or ePUB format, as well as other popular books in Ciencia de la computación & Criptografía. We have over one million books available in our catalogue for you to explore.

Information

Year
2020
ISBN
9780128194393
1

Introduction to digital image steganography

M. Hassaballaha; Mohamed Abdel Hameedb; Monagi H. Alkinanic aSouth Valley University, Faculty of Computers and Information, Department of Computer Science, Qena, Egypt
bLuxor University, Faculty of Computers and Information, Department of Computer Science, Luxor, Egypt
cUniversity of Jeddah, College of Computer Science and Engineering, Department of Computer Science and Artificial Intelligence, Jeddah, Saudi Arabia

Abstract

The Internet and cloud services are widely used in transmission of large amounts of data over open networks and insecure channels, exposing private and secret data to serious situations. Thus ensuring that information transmission over these mediums is safe and secure has become one of the most important issues in the data security field. To keep unauthorized persons away from the transmitted information, a variety of techniques have been introduced, and steganography is one of them. As a technique for covert communication, steganography aims to hide secret messages in a normal message achieving the least possible statistical detectability and without drawing suspicion. Steganography techniques can be applied on a various types of data such as text, image, video, and audio data. This chapter presents a general and brief introduction to exemplify the tremendous progress achieved recently in the topic of image steganography to help readers and researchers in discovering new research gaps in the theoretical foundations and practical implementations of steganography techniques.

Keywords

Privacy; Data security; Digital media steganography; Image steganography; Audio Steganography; Steganalysis

1.1 Introduction

Steganography has been used from ages and has been set its roots from ancient civilizations (e.g., Greece, Egypt). The word steganography is a composite of two Greek words: Steganos which means “covered” and Graphia which means “writing”. In the 5th century BC, Histaiacus shaved a slave's head and tattooed a message on his skull, and the slave was dispatched with the message after his hair grew back [1]. Cardan (1501–1576) reinvented a Chinese ancient method of secret writing, where a paper mask with holes is shared among two parties, this mask is placed over a blank paper, and a sender writes the secret message through the holes, then takes the mask off, and fills the blanks to display the message as an innocuous text. This method was approved to Cardan Grille [2]. Null Ciphers, Microdots, and invisible ink methods were also very popular steganographic methods during World War II. These hiding secret message methods have been used in various forms for thousands of years [3].
Nowadays, digital steganography can be defined as the art of hiding secret messages behind the innocent looking digital media [4]. Jessica [2] defined steganography as the art of concealed communication where the existence of a message is secret. Other researchers define digital steganography as a task of hiding digital information in covert channels so that one can conceal some information and prevent detection of this hidden information [5]. Steganography can be defined as a science of obscuring a message in a carrier (host object) with the intent of not drawing suspicion to the context in which the messages is transferred [6]. In general, there are several types of digital mediums, which can be used for hiding secret information such as image, video, audio, and text (linguistics) as shown in Fig. 1.1. These digital mediums have different characteristics to embed secret information [7], where the best medium for embedding secret information must have two features: the medium should be popular, and the modification in this host (cover) should be invisible to any unauthorized third party.
Image

Figure 1.1 Categories of digital media steganography.
To the best...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of contributors
  6. About the editor
  7. Preface
  8. Acknowledgments
  9. 1: Introduction to digital image steganography
  10. 2: A color image steganography method based on ADPVD and HOG techniques
  11. 3: An improved method for high hiding capacity based on LSB and PVD
  12. 4: An efficient image steganography method using multiobjective differential evolution
  13. 5: Image steganography using add-sub based QVD and side match
  14. 6: A high-capacity invertible steganography method for stereo image
  15. 7: An adaptive and clustering-based steganographic method: OSteg
  16. 8: A steganography method based on decomposition of the Catalan numbers
  17. 9: A steganography approach for hiding privacy in video surveillance systems
  18. 10: Reversible steganography techniques: A survey
  19. 11: Quantum steganography
  20. 12: Digital media steganalysis
  21. 13: Unsupervised steganographer identification via clustering and outlier detection
  22. 14: Deep learning in steganography and steganalysis
  23. Index
Citation styles for Digital Media Steganography

APA 6 Citation

[author missing]. (2020). Digital Media Steganography ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Original work published 2020)

Chicago Citation

[author missing]. (2020) 2020. Digital Media Steganography. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf.

Harvard Citation

[author missing] (2020) Digital Media Steganography. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Accessed: 15 October 2022).

MLA 7 Citation

[author missing]. Digital Media Steganography. [edition unavailable]. Elsevier Science, 2020. Web. 15 Oct. 2022.