Digital Media Steganography
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

  1. 386 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

  • Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography
  • Provides new theoretical breakthroughs and a number of modern techniques in steganography
  • Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Digital Media Steganography est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Digital Media Steganography par Mahmoud Hassaballah en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Ciencia de la computaciĂłn et CriptografĂ­a. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Éditeur
Academic Press
Année
2020
ISBN
9780128194393
1

Introduction to digital image steganography

M. Hassaballaha; Mohamed Abdel Hameedb; Monagi H. Alkinanic aSouth Valley University, Faculty of Computers and Information, Department of Computer Science, Qena, Egypt
bLuxor University, Faculty of Computers and Information, Department of Computer Science, Luxor, Egypt
cUniversity of Jeddah, College of Computer Science and Engineering, Department of Computer Science and Artificial Intelligence, Jeddah, Saudi Arabia

Abstract

The Internet and cloud services are widely used in transmission of large amounts of data over open networks and insecure channels, exposing private and secret data to serious situations. Thus ensuring that information transmission over these mediums is safe and secure has become one of the most important issues in the data security field. To keep unauthorized persons away from the transmitted information, a variety of techniques have been introduced, and steganography is one of them. As a technique for covert communication, steganography aims to hide secret messages in a normal message achieving the least possible statistical detectability and without drawing suspicion. Steganography techniques can be applied on a various types of data such as text, image, video, and audio data. This chapter presents a general and brief introduction to exemplify the tremendous progress achieved recently in the topic of image steganography to help readers and researchers in discovering new research gaps in the theoretical foundations and practical implementations of steganography techniques.

Keywords

Privacy; Data security; Digital media steganography; Image steganography; Audio Steganography; Steganalysis

1.1 Introduction

Steganography has been used from ages and has been set its roots from ancient civilizations (e.g., Greece, Egypt). The word steganography is a composite of two Greek words: Steganos which means “covered” and Graphia which means “writing”. In the 5th century BC, Histaiacus shaved a slave's head and tattooed a message on his skull, and the slave was dispatched with the message after his hair grew back [1]. Cardan (1501–1576) reinvented a Chinese ancient method of secret writing, where a paper mask with holes is shared among two parties, this mask is placed over a blank paper, and a sender writes the secret message through the holes, then takes the mask off, and fills the blanks to display the message as an innocuous text. This method was approved to Cardan Grille [2]. Null Ciphers, Microdots, and invisible ink methods were also very popular steganographic methods during World War II. These hiding secret message methods have been used in various forms for thousands of years [3].
Nowadays, digital steganography can be defined as the art of hiding secret messages behind the innocent looking digital media [4]. Jessica [2] defined steganography as the art of concealed communication where the existence of a message is secret. Other researchers define digital steganography as a task of hiding digital information in covert channels so that one can conceal some information and prevent detection of this hidden information [5]. Steganography can be defined as a science of obscuring a message in a carrier (host object) with the intent of not drawing suspicion to the context in which the messages is transferred [6]. In general, there are several types of digital mediums, which can be used for hiding secret information such as image, video, audio, and text (linguistics) as shown in Fig. 1.1. These digital mediums have different characteristics to embed secret information [7], where the best medium for embedding secret information must have two features: the medium should be popular, and the modification in this host (cover) should be invisible to any unauthorized third party.
Image

Figure 1.1 Categories of digital media steganography.
To the best...

Table des matiĂšres

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of contributors
  6. About the editor
  7. Preface
  8. Acknowledgments
  9. 1: Introduction to digital image steganography
  10. 2: A color image steganography method based on ADPVD and HOG techniques
  11. 3: An improved method for high hiding capacity based on LSB and PVD
  12. 4: An efficient image steganography method using multiobjective differential evolution
  13. 5: Image steganography using add-sub based QVD and side match
  14. 6: A high-capacity invertible steganography method for stereo image
  15. 7: An adaptive and clustering-based steganographic method: OSteg
  16. 8: A steganography method based on decomposition of the Catalan numbers
  17. 9: A steganography approach for hiding privacy in video surveillance systems
  18. 10: Reversible steganography techniques: A survey
  19. 11: Quantum steganography
  20. 12: Digital media steganalysis
  21. 13: Unsupervised steganographer identification via clustering and outlier detection
  22. 14: Deep learning in steganography and steganalysis
  23. Index
Normes de citation pour Digital Media Steganography

APA 6 Citation

[author missing]. (2020). Digital Media Steganography ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Original work published 2020)

Chicago Citation

[author missing]. (2020) 2020. Digital Media Steganography. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf.

Harvard Citation

[author missing] (2020) Digital Media Steganography. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Accessed: 15 October 2022).

MLA 7 Citation

[author missing]. Digital Media Steganography. [edition unavailable]. Elsevier Science, 2020. Web. 15 Oct. 2022.