Digital Media Steganography
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

  1. 386 pagine
  2. English
  3. ePUB (disponibile sull'app)
  4. Disponibile su iOS e Android
eBook - ePub

Digital Media Steganography

Principles, Algorithms, and Advances

Mahmoud Hassaballah

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

  • Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography
  • Provides new theoretical breakthroughs and a number of modern techniques in steganography
  • Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Digital Media Steganography è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Digital Media Steganography di Mahmoud Hassaballah in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Ciencia de la computación e Criptografía. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Anno
2020
ISBN
9780128194393
1

Introduction to digital image steganography

M. Hassaballaha; Mohamed Abdel Hameedb; Monagi H. Alkinanic aSouth Valley University, Faculty of Computers and Information, Department of Computer Science, Qena, Egypt
bLuxor University, Faculty of Computers and Information, Department of Computer Science, Luxor, Egypt
cUniversity of Jeddah, College of Computer Science and Engineering, Department of Computer Science and Artificial Intelligence, Jeddah, Saudi Arabia

Abstract

The Internet and cloud services are widely used in transmission of large amounts of data over open networks and insecure channels, exposing private and secret data to serious situations. Thus ensuring that information transmission over these mediums is safe and secure has become one of the most important issues in the data security field. To keep unauthorized persons away from the transmitted information, a variety of techniques have been introduced, and steganography is one of them. As a technique for covert communication, steganography aims to hide secret messages in a normal message achieving the least possible statistical detectability and without drawing suspicion. Steganography techniques can be applied on a various types of data such as text, image, video, and audio data. This chapter presents a general and brief introduction to exemplify the tremendous progress achieved recently in the topic of image steganography to help readers and researchers in discovering new research gaps in the theoretical foundations and practical implementations of steganography techniques.

Keywords

Privacy; Data security; Digital media steganography; Image steganography; Audio Steganography; Steganalysis

1.1 Introduction

Steganography has been used from ages and has been set its roots from ancient civilizations (e.g., Greece, Egypt). The word steganography is a composite of two Greek words: Steganos which means “covered” and Graphia which means “writing”. In the 5th century BC, Histaiacus shaved a slave's head and tattooed a message on his skull, and the slave was dispatched with the message after his hair grew back [1]. Cardan (1501–1576) reinvented a Chinese ancient method of secret writing, where a paper mask with holes is shared among two parties, this mask is placed over a blank paper, and a sender writes the secret message through the holes, then takes the mask off, and fills the blanks to display the message as an innocuous text. This method was approved to Cardan Grille [2]. Null Ciphers, Microdots, and invisible ink methods were also very popular steganographic methods during World War II. These hiding secret message methods have been used in various forms for thousands of years [3].
Nowadays, digital steganography can be defined as the art of hiding secret messages behind the innocent looking digital media [4]. Jessica [2] defined steganography as the art of concealed communication where the existence of a message is secret. Other researchers define digital steganography as a task of hiding digital information in covert channels so that one can conceal some information and prevent detection of this hidden information [5]. Steganography can be defined as a science of obscuring a message in a carrier (host object) with the intent of not drawing suspicion to the context in which the messages is transferred [6]. In general, there are several types of digital mediums, which can be used for hiding secret information such as image, video, audio, and text (linguistics) as shown in Fig. 1.1. These digital mediums have different characteristics to embed secret information [7], where the best medium for embedding secret information must have two features: the medium should be popular, and the modification in this host (cover) should be invisible to any unauthorized third party.
Image

Figure 1.1 Categories of digital media steganography.
To the best...

Indice dei contenuti

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of contributors
  6. About the editor
  7. Preface
  8. Acknowledgments
  9. 1: Introduction to digital image steganography
  10. 2: A color image steganography method based on ADPVD and HOG techniques
  11. 3: An improved method for high hiding capacity based on LSB and PVD
  12. 4: An efficient image steganography method using multiobjective differential evolution
  13. 5: Image steganography using add-sub based QVD and side match
  14. 6: A high-capacity invertible steganography method for stereo image
  15. 7: An adaptive and clustering-based steganographic method: OSteg
  16. 8: A steganography method based on decomposition of the Catalan numbers
  17. 9: A steganography approach for hiding privacy in video surveillance systems
  18. 10: Reversible steganography techniques: A survey
  19. 11: Quantum steganography
  20. 12: Digital media steganalysis
  21. 13: Unsupervised steganographer identification via clustering and outlier detection
  22. 14: Deep learning in steganography and steganalysis
  23. Index
Stili delle citazioni per Digital Media Steganography

APA 6 Citation

[author missing]. (2020). Digital Media Steganography ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Original work published 2020)

Chicago Citation

[author missing]. (2020) 2020. Digital Media Steganography. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf.

Harvard Citation

[author missing] (2020) Digital Media Steganography. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1810226/digital-media-steganography-principles-algorithms-and-advances-pdf (Accessed: 15 October 2022).

MLA 7 Citation

[author missing]. Digital Media Steganography. [edition unavailable]. Elsevier Science, 2020. Web. 15 Oct. 2022.