Digital Media Steganography
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

  1. 386 Seiten
  2. English
  3. ePUB (handyfreundlich)
  4. Über iOS und Android verfügbar
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

  • Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography
  • Provides new theoretical breakthroughs and a number of modern techniques in steganography
  • Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Digital Media Steganography als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Digital Media Steganography von Mahmoud Hassaballah im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Ciencia de la computación & Criptografía. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Information

1

Introduction to digital image steganography

M. Hassaballaha; Mohamed Abdel Hameedb; Monagi H. Alkinanic aSouth Valley University, Faculty of Computers and Information, Department of Computer Science, Qena, Egypt
bLuxor University, Faculty of Computers and Information, Department of Computer Science, Luxor, Egypt
cUniversity of Jeddah, College of Computer Science and Engineering, Department of Computer Science and Artificial Intelligence, Jeddah, Saudi Arabia

Abstract

The Internet and cloud services are widely used in transmission of large amounts of data over open networks and insecure channels, exposing private and secret data to serious situations. Thus ensuring that information transmission over these mediums is safe and secure has become one of the most important issues in the data security field. To keep unauthorized persons away from the transmitted information, a variety of techniques have been introduced, and steganography is one of them. As a technique for covert communication, steganography aims to hide secret messages in a normal message achieving the least possible statistical detectability and without drawing suspicion. Steganography techniques can be applied on a various types of data such as text, image, video, and audio data. This chapter presents a general and brief introduction to exemplify the tremendous progress achieved recently in the topic of image steganography to help readers and researchers in discovering new research gaps in the theoretical foundations and practical implementations of steganography techniques.

Keywords

Privacy; Data security; Digital media steganography; Image steganography; Audio Steganography; Steganalysis

1.1 Introduction

Steganography has been used from ages and has been set its roots from ancient civilizations (e.g., Greece, Egypt). The word steganography is a composite of two Greek words: Steganos which means “covered” and Graphia which means “writing”. In the 5th century BC, Histaiacus shaved a slave's head and tattooed a message on his skull, and the slave was dispatched with the message after his hair grew back [1]. Cardan (1501–1576) reinvented a Chinese ancient method of secret writing, where a paper mask with holes is shared among two parties, this mask is placed over a blank paper, and a sender writes the secret message through the holes, then takes the mask off, and fills the blanks to display the message as an innocuous text. This method was approved to Cardan Grille [2]. Null Ciphers, Microdots, and invisible ink methods were also very popular steganographic methods during World War II. These hiding secret message methods have been used in various forms for thousands of years [3].
Nowadays, digital steganography can be defined as the art of hiding secret messages behind the innocent looking digital media [4]. Jessica [2] defined steganography as the art of concealed communication where the existence of a message is secret. Other researchers define digital steganography as a task of hiding digital information in covert channels so that one can conceal some information and prevent detection of this hidden information [5]. Steganography can be defined as a science of obscuring a message in a carrier (host object) with the intent of not drawing suspicion to the context in which the messages is transferred [6]. In general, there are several types of digital mediums, which can be used for hiding secret information such as image, video, audio, and text (linguistics) as shown in Fig. 1.1. These digital mediums have different characteristics to embed secret information [7], where the best medium for embedding secret information must have two features: the medium should be popular, and the modification in this host (cover) should be invisible to any unauthorized third party.
Image

Figure 1.1 Categories of digital media steganography.
To the best...

Inhaltsverzeichnis

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of contributors
  6. About the editor
  7. Preface
  8. Acknowledgments
  9. 1: Introduction to digital image steganography
  10. 2: A color image steganography method based on ADPVD and HOG techniques
  11. 3: An improved method for high hiding capacity based on LSB and PVD
  12. 4: An efficient image steganography method using multiobjective differential evolution
  13. 5: Image steganography using add-sub based QVD and side match
  14. 6: A high-capacity invertible steganography method for stereo image
  15. 7: An adaptive and clustering-based steganographic method: OSteg
  16. 8: A steganography method based on decomposition of the Catalan numbers
  17. 9: A steganography approach for hiding privacy in video surveillance systems
  18. 10: Reversible steganography techniques: A survey
  19. 11: Quantum steganography
  20. 12: Digital media steganalysis
  21. 13: Unsupervised steganographer identification via clustering and outlier detection
  22. 14: Deep learning in steganography and steganalysis
  23. Index
Zitierstile für Digital Media Steganography

APA 6 Citation

[author missing]. (2020). Digital Media Steganography ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Original work published 2020)

Chicago Citation

[author missing]. (2020) 2020. Digital Media Steganography. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf.

Harvard Citation

[author missing] (2020) Digital Media Steganography. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Accessed: 15 October 2022).

MLA 7 Citation

[author missing]. Digital Media Steganography. [edition unavailable]. Elsevier Science, 2020. Web. 15 Oct. 2022.