A cover image model for reliable steganalysis
IH'11 Proceedings of the 13th international conference on Information hiding
StegoTorus: a camouflage proxy for the Tor anonymity system
Proceedings of the 2012 ACM conference on Computer and communications security
Steganalysis of LSB replacement using parity-aware features
IH'12 Proceedings of the 14th international conference on Information Hiding
Statistical detection of LSB matching using hypothesis testing theory
IH'12 Proceedings of the 14th international conference on Information Hiding
JPEG-Compatibility steganalysis using block-histogram of recompression artifacts
IH'12 Proceedings of the 14th international conference on Information Hiding
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
Digital image steganography using universal distortion
Proceedings of the first ACM workshop on Information hiding and multimedia security
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Message in a bottle: sailing past censorship
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.