Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010262648 | QA76.9.A25 F75 2010 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.
Reviews 1
Choice Review
This extremely well-designed and well-written course resource focuses on hiding and detecting messages embedded in digital images. Fridrich (SUNY Binghamton) organizes the book into 13 chapters. Chapter 1 defines steganography and traces its history. Though sending covert messages dates back to early Greek times, modern steganography began evolving rapidly only with the development of digital communication capabilities. The second and third chapters introduce digital image formats and acquisition sensors to use in the examples provided in the remainder of the book. The next six chapters progressively develop steganography embedding techniques from the simple to the more secure. These are followed by three chapters on steganalysis, i.e., detecting hidden messages. The final chapter addresses determining the largest message that may be embedded securely. A chapter typically begins with an introduction discussing the chapter's purpose and concludes with a summary and exercises. Five appendixes provide the various mathematical bases used throughout the text, an extensive glossary, and a lengthy reference list. Though clearly intended as a textbook for senior undergraduate and graduate students, this book also has potential appeal for network security and privacy professionals. Summing Up: Recommended. Upper-division undergraduates through professionals. E. M. Aupperle emeritus, University of Michigan
Table of Contents
Preface |
Acknowledgments |
1 Introduction |
2 Digital image formats |
3 Digital image acquisition |
4 Steganographic channel |
5 Naive steganography |
6 Steganographic security |
7 Practical steganographic methods |
8 Matrix embedding |
9 Non-shared selection channel |
10 Steganalysis |
11 Selected targeted attacks |
12 Blind steganalysis |
13 Steganography |
A Statistics |
B Information theory |
C Linear codes |
D Signal detection and estimation |
E Support vector machines |
Notation |
Glossary |
References |
Index |