FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title Image Steganography and Steganalysis
- Authors Philip Bateman
- Publisher: University of Surrey (2008)
- Paperback: N/A
- eBook: PDF (127 pages)
- Language: English
- ISBN-10: N/A
- ISBN-13: N/A
- Share This:
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganography has advantages over cryptography since message can be communicated to the desired recipient without raising any suspicion. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file.
This book describes image steganography algorithms and one steganalysis algorithm. The steganography algorithms are primarily based on restoring the statistics of a image after embedding data in them which results in low detection rate as compared to other existing algorithms.
The steganalysis algorithm uses second order statistical features along with machine learning to train and predict if an image contains embedded message. Steganography can be used in many applications. In commercial sector, data hiding techniques can be used to enforce copyright on a digital medium. The access control information can be embedded inside the digital medium which can eventually be verified by the media player before playing the file.
About the Authors- N/A
- Computer Forensics, Watermarking, Steganography, Nmap, etc.
- Cryptography, Cryptology, and Cryptanalysis
- Digital Signal Processing (DSP), Sound and Imaging Processing
- Computer and Machine Vision, Forensics
-
Recent Advances in Steganography (Hedieh Sajedi)
This book focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis.
-
Algorithms for Audio Watermarking and Steganography
The main results of this book are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity.
-
Watermarking - Volume 1 (Mithun Das Gupta)
This collection of two books brings some of the latest developments in the field of watermarking. Book one is more traditional in its approach dealing mostly with image watermarking applications.
-
Watermarking - Volume 2 (Mithun Das Gupta)
This collection of two books brings some of the latest developments in the field of watermarking. Book two deals with audio watermarking and describes an array of chapters on performance analysis of algorithms.
-
Natural Image Statistics in Digital Image Forensics (Siwei Lyu)
This book provides the first general framework, based on universal statistical properties of natural images, of detecting tampering and authenticating digital images that has been successfully applied to three problems in digital image forensics.
-
Multimedia Fingerprinting Forensics for Traitor Tracing (K.J. Liu)
This book describes the framework of multimedia fingerprinting by providing readers with a broader view of the evolution of the young field of multimedia forensics. It covers the essential aspects of research in this emerging technology.
-
Multimedia Forensics (Husrev Taha Sencar, et al)
Media forensics has never been more relevant to societal life. This book presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics.
-
Visual Cryptography and Its Applications (Jonathan Weir, et al)
In this book, one of the data security methods known as Visual Cryptography (VC) is presented. Many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments.
:
|
|