Steganography and Steganalysis

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic €32.70 /Month

Buy Now

Price includes VAT (France)

eBook EUR 93.08 Price includes VAT (France)

Hardcover Book EUR 116.04 Price includes VAT (France)

Tax calculation will be finalised at checkout

Purchases are for personal use only

References

  1. A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods.” Signal Processing, 2010, vol. 90, no. 3, pp. 727–752, March 2010 ArticleGoogle Scholar
  2. C. Hosmer and C. Hyde. Discovering covert digital evidence. Digital Forensic Research Workshop (DFRWS) 2003, August 2003 [Online]. (January 4, 2004). Available: http://www.dfrws.org/dfrws2003/presentations/Paper-Hosmer-digitalevidence.pdf
  3. Jordan Green, Ian Levstein, Robert J. Boggs, Terry Fenger. Steganography Analysis: Efficacy and Response-Time of Current Steganalysis Software. http://www.marshall.edu/forensics/files/GreenJordan_Research-Paper_08_07_20141.pdf
  4. A. Whitehead, “Towards Eliminating Steganographic Communication”, Proc. International Conference on Privacy, Security and Trust (PST), October 12-14, 2005, New Brunswick, Canada Google Scholar
  5. A. K. Shukla, “Data Hiding in Digital Images”, A Review[C] STEG’04: Pacific Rim Workshop on Digital Steganography, 2004 Google Scholar
  6. W. R. Bender, D. Gruhl, N. Morimoto, “Techniques for data hiding.” IS&T/SPIE’s Symposium on Electronic Imaging: Science & Technology International Society for Optics and Photonics, 1995, vol. 35, NOS. 3&4, pp. 313-336 ArticleGoogle Scholar
  7. P. Hayati, V. Potdar, E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator.” http://www.pedramhayati.com/images/docs/survey_of_steganography_and_steganalytic_tools.pdf
  8. W. R. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, 1996 ArticleGoogle Scholar
  9. G. C. Kessler, “An Overview of Steganography for the Computer Forensics Examiner”, Forensic Science Communications, 2004 Google Scholar
  10. M. Bachrach and F. Y. Shih, “Image Steganography and Steganalysis”, Wiley Interdisciplinary Reviews Computational Statistics, 2011, vol. 3, pp. 251-259 ArticleGoogle Scholar
  11. G. L. Smitha, E. Baburaj, “A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm.” Proc. International Conference on Emerging Technological Trends, 2016 Google Scholar
  12. W. Luo, F. Huang, J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited.” IEEE Transactions on Information Forensics & Security, 2010, pp. 201-214 Google Scholar
  13. J. Harmsen, W. Pearlman, “Steganalysis of additive-noise modelable information hiding”, Spie Processing, 2003, 5020:131-142 Google Scholar
  14. J. Mielikainen, “LSB Matching Revisited”, IEEE Signal Processing Letters, 2006, vol. 13, no. 5, pp. 285-287 ArticleGoogle Scholar
  15. R. J. Anderson, “Stretching the Limits of Steganography.” International Workshop on Information Hiding Springer-Verlag, 1996, vol. 1174, no. 4, pp. 39-48 ChapterGoogle Scholar
  16. C. C. Chang, T. S. Chen, and L. Z. Chung. “A steganographic Method Based Upon JPEG and Quantization Table Modification.” Information Sciences, 2002, vol. 141, no. 1–2, pp. 123-138 ArticleGoogle Scholar
  17. List of 10 Best Steganography Tools to Hide Data. https://www.geekdashboard.com/best-steganography-tools/#openstego
  18. B. Li, J. He, J. Huang, Y. Shi, A survey on image steganography and steganalysis, Department of Computing, vol. 2, no. 3, pp. 288-289, 2011 Google Scholar
  19. I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics”, IEEE Trans. Image Process., vol. 12, no. 2, pp. 221-229, 2003 ArticleMathSciNetGoogle Scholar
  20. X. Luo, F. Liu, S. Lian, C. Yang, S. Gritzalis, “On the Typical Statistic Features for Image Blind Steganalysis.” IEEE Journal on Selected Areas in Communications, 2011, vol. 29, no. 7, pp. 1404-1422 ArticleGoogle Scholar
  21. M. U. Celik, G. Sharma, and A. M. Tekalp, “Universal Image Steganalysis Using Rate-Distortion Curves”, Proc. Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 467-476, San Jose, California, USA, 2004 Google Scholar

Author information

Authors and Affiliations

  1. Department of Physics and Computer Science, Faculty of Science, Wilfrid Laurier University, Waterloo, ON, Canada Xiaodong Lin
  1. Xiaodong Lin
You can also search for this author in PubMed Google Scholar

Rights and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Cite this chapter

Lin, X. (2018). Steganography and Steganalysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_21

Download citation

Share this chapter

Anyone you share the following link with will be able to read this content:

Get shareable link

Sorry, a shareable link is not currently available for this article.

Copy to clipboard

Provided by the Springer Nature SharedIt content-sharing initiative