Cover image for Steganography in digital media : principles, algorithms, and applications
Title:
Steganography in digital media : principles, algorithms, and applications
Personal Author:
Publication Information:
Cambridge : Cambridge University Press, c2010
Physical Description:
xxii, 437 p., [4] p. of plates : ill. (some col.) ; 26 cm.
ISBN:
9780521190190

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010262648 QA76.9.A25 F75 2010 Open Access Book Book
Searching...

On Order

Summary

Summary

Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.


Reviews 1

Choice Review

This extremely well-designed and well-written course resource focuses on hiding and detecting messages embedded in digital images. Fridrich (SUNY Binghamton) organizes the book into 13 chapters. Chapter 1 defines steganography and traces its history. Though sending covert messages dates back to early Greek times, modern steganography began evolving rapidly only with the development of digital communication capabilities. The second and third chapters introduce digital image formats and acquisition sensors to use in the examples provided in the remainder of the book. The next six chapters progressively develop steganography embedding techniques from the simple to the more secure. These are followed by three chapters on steganalysis, i.e., detecting hidden messages. The final chapter addresses determining the largest message that may be embedded securely. A chapter typically begins with an introduction discussing the chapter's purpose and concludes with a summary and exercises. Five appendixes provide the various mathematical bases used throughout the text, an extensive glossary, and a lengthy reference list. Though clearly intended as a textbook for senior undergraduate and graduate students, this book also has potential appeal for network security and privacy professionals. Summing Up: Recommended. Upper-division undergraduates through professionals. E. M. Aupperle emeritus, University of Michigan


Table of Contents

Preface
Acknowledgments
1 Introduction
2 Digital image formats
3 Digital image acquisition
4 Steganographic channel
5 Naive steganography
6 Steganographic security
7 Practical steganographic methods
8 Matrix embedding
9 Non-shared selection channel
10 Steganalysis
11 Selected targeted attacks
12 Blind steganalysis
13 Steganography
A Statistics
B Information theory
C Linear codes
D Signal detection and estimation
E Support vector machines
Notation
Glossary
References
Index