Steganography and Steganalysis
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save
Springer+ Basic
€32.70 /Month
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (France)
eBook EUR 93.08 Price includes VAT (France)
Hardcover Book EUR 116.04 Price includes VAT (France)
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
- A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods.” Signal Processing, 2010, vol. 90, no. 3, pp. 727–752, March 2010 ArticleGoogle Scholar
- C. Hosmer and C. Hyde. Discovering covert digital evidence. Digital Forensic Research Workshop (DFRWS) 2003, August 2003 [Online]. (January 4, 2004). Available: http://www.dfrws.org/dfrws2003/presentations/Paper-Hosmer-digitalevidence.pdf
- Jordan Green, Ian Levstein, Robert J. Boggs, Terry Fenger. Steganography Analysis: Efficacy and Response-Time of Current Steganalysis Software. http://www.marshall.edu/forensics/files/GreenJordan_Research-Paper_08_07_20141.pdf
- A. Whitehead, “Towards Eliminating Steganographic Communication”, Proc. International Conference on Privacy, Security and Trust (PST), October 12-14, 2005, New Brunswick, Canada Google Scholar
- A. K. Shukla, “Data Hiding in Digital Images”, A Review[C] STEG’04: Pacific Rim Workshop on Digital Steganography, 2004 Google Scholar
- W. R. Bender, D. Gruhl, N. Morimoto, “Techniques for data hiding.” IS&T/SPIE’s Symposium on Electronic Imaging: Science & Technology International Society for Optics and Photonics, 1995, vol. 35, NOS. 3&4, pp. 313-336 ArticleGoogle Scholar
- P. Hayati, V. Potdar, E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator.” http://www.pedramhayati.com/images/docs/survey_of_steganography_and_steganalytic_tools.pdf
- W. R. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, 1996 ArticleGoogle Scholar
- G. C. Kessler, “An Overview of Steganography for the Computer Forensics Examiner”, Forensic Science Communications, 2004 Google Scholar
- M. Bachrach and F. Y. Shih, “Image Steganography and Steganalysis”, Wiley Interdisciplinary Reviews Computational Statistics, 2011, vol. 3, pp. 251-259 ArticleGoogle Scholar
- G. L. Smitha, E. Baburaj, “A Survey on Image Steganography Based on Least Significant Bit Matched Revisited (LSBMR) Algorithm.” Proc. International Conference on Emerging Technological Trends, 2016 Google Scholar
- W. Luo, F. Huang, J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited.” IEEE Transactions on Information Forensics & Security, 2010, pp. 201-214 Google Scholar
- J. Harmsen, W. Pearlman, “Steganalysis of additive-noise modelable information hiding”, Spie Processing, 2003, 5020:131-142 Google Scholar
- J. Mielikainen, “LSB Matching Revisited”, IEEE Signal Processing Letters, 2006, vol. 13, no. 5, pp. 285-287 ArticleGoogle Scholar
- R. J. Anderson, “Stretching the Limits of Steganography.” International Workshop on Information Hiding Springer-Verlag, 1996, vol. 1174, no. 4, pp. 39-48 ChapterGoogle Scholar
- C. C. Chang, T. S. Chen, and L. Z. Chung. “A steganographic Method Based Upon JPEG and Quantization Table Modification.” Information Sciences, 2002, vol. 141, no. 1–2, pp. 123-138 ArticleGoogle Scholar
- List of 10 Best Steganography Tools to Hide Data. https://www.geekdashboard.com/best-steganography-tools/#openstego
- B. Li, J. He, J. Huang, Y. Shi, A survey on image steganography and steganalysis, Department of Computing, vol. 2, no. 3, pp. 288-289, 2011 Google Scholar
- I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics”, IEEE Trans. Image Process., vol. 12, no. 2, pp. 221-229, 2003 ArticleMathSciNetGoogle Scholar
- X. Luo, F. Liu, S. Lian, C. Yang, S. Gritzalis, “On the Typical Statistic Features for Image Blind Steganalysis.” IEEE Journal on Selected Areas in Communications, 2011, vol. 29, no. 7, pp. 1404-1422 ArticleGoogle Scholar
- M. U. Celik, G. Sharma, and A. M. Tekalp, “Universal Image Steganalysis Using Rate-Distortion Curves”, Proc. Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 467-476, San Jose, California, USA, 2004 Google Scholar
Author information
Authors and Affiliations
- Department of Physics and Computer Science, Faculty of Science, Wilfrid Laurier University, Waterloo, ON, Canada Xiaodong Lin
- Xiaodong Lin
You can also search for this author in PubMed Google Scholar
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, X. (2018). Steganography and Steganalysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_21
Download citation
- DOI : https://doi.org/10.1007/978-3-030-00581-8_21
- Published : 11 November 2018
- Publisher Name : Springer, Cham
- Print ISBN : 978-3-030-00580-1
- Online ISBN : 978-3-030-00581-8
- eBook Packages : Computer ScienceComputer Science (R0)
Share this chapter
Anyone you share the following link with will be able to read this content:
Get shareable link
Sorry, a shareable link is not currently available for this article.
Copy to clipboard
Provided by the Springer Nature SharedIt content-sharing initiative