Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Steganography and Steganalysis

View through CrossRef
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent. Though the focus on use of steganography for criminal and terrorist purposes detracts from the potential use for legitimate purposes, the focus in this chapter is on its role as a security threat. The history of stenography as a tool for covert purposes is addressed. Recent technical innovations in computerized steganography are presented, and selected widely available steganography tools are presented. Finally, a brief discussion of the role of steganalysis is presented.
Title: Steganography and Steganalysis
Description:
In the digital environment, steganography has increasingly received attention over the last decade.
Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent.
Though the focus on use of steganography for criminal and terrorist purposes detracts from the potential use for legitimate purposes, the focus in this chapter is on its role as a security threat.
The history of stenography as a tool for covert purposes is addressed.
Recent technical innovations in computerized steganography are presented, and selected widely available steganography tools are presented.
Finally, a brief discussion of the role of steganalysis is presented.

Related Results

A Mathematical Formulation of Classified Variables for Enhanced Detection in Natural Language Steganalysis
A Mathematical Formulation of Classified Variables for Enhanced Detection in Natural Language Steganalysis
Steganalysis, which is the counterpart to steganography, is an art and science that is devoted to detecting hidden information that has been concealed within seemingly harmless dig...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Benchmarking Steganalysis
Benchmarking Steganalysis
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are used to measure detection accura...
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
test
test
Image steganalysis ranges from detecting the presence of covert information in an image (passive steganalysis) to extraction of the information from the stego image (active stegana...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...

Back to Top