Computational Aspects of Digital Steganography

Computational Aspects of Digital Steganography

Maciej Liskiewicz (Institute of Theoretical Computer Science, University of Lübeck, Germany) and Ulrich Wölfel (Federal Office for Information Security (BSI), Germany)
Copyright: © 2009 |Pages: 19
DOI: 10.4018/978-1-59904-869-7.ch010
OnDemand PDF Download:


This chapter provides an overview, based on current research, on theoretical aspects of digital steganography— a relatively new field of computer science that deals with hiding secret data in unsuspicious cover media. We focus on formal analysis of security of steganographic systems from a computational complexity point of view and provide models of secure systems that make realistic assumptions of limited computational resources of involved parties. This allows us to look at steganographic secrecy based on reasonable complexity assumptions similar to ones commonly accepted in modern cryptography. In this chapter we expand the analyses of stego-systems beyond security aspects, which practitioners find difficult to implement (if not impossible to realize), to the question why such systems are so difficult to implement and what makes these systems different from practically used ones.

Complete Chapter List

Search this Book:
List of Reviewers
Table of Contents
Anthony T.S. Ho
Chang-Tsun Li
Chapter 1
Hae Yong Kim, Sergio Vicente Denser Pamboukian, Paulo Sérgio Licciardi Messeder Barreto
Data hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it... Sample PDF
Authentication Watermarkings for Binary Images
Chapter 2
Shiguo Lian
Since the past decade, multimedia protection technologies have been attracting more and more researchers. Among them, multimedia encryption and... Sample PDF
Secure Multimedia Content Distribution Based on Watermarking Technology
Chapter 3
Maria Calagna
The chapter illustrates watermarking based on the transform domain. It argues that transform-based watermarking is robust to possible attacks and... Sample PDF
Digital Watermarking in the Transform Domain with Emphasis on SVD
Chapter 4
Robert Caldelli, Alessandro Piva
This chapter is devoted to the analysis of the collusion attack applied to current digital video watermarking algorithms. In particular, we analyze... Sample PDF
Digital Video Watermarking and the Collusion Attack
Chapter 5
Nataša Terzija
The resistance of watermarking schemes against geometric distortions has been the subject of much research and development effort in the last 10... Sample PDF
A Survey of Current Watermarking Synchronization Techniques
Chapter 6
Martin Steinebach, Patrick Wolf
Digital watermarking promises to be a mechanism for copyright protection without being a technology for copy prevention. This sometimes makes it... Sample PDF
On the Necessity of Finding Content Before Watermark Retrieval: Active Search Strategies for Localising Watermarked Media on the Internet
Chapter 7
Fouad Khelifi, Fatih Kurugollu, Ahmed Bouridane
The problem of multiplicative watermark detection in digital images can be viewed as a binary decision where the observation is the possibility that... Sample PDF
Statistical Watermark Detection in the Transform Domain for Digital Images
Chapter 8
Christopher B. Smith, Sos S. Agaian
Modern digital steganography has evolved a number of techniques to embed information near invisibly into digital media. Many of the techniques for... Sample PDF
On Noise, Steganography, and the Active Warden
Chapter 9
Patrick Le Callet, Florent Autrusseau, Patrizio Campisi
In watermarking and data hiding context, it may be very useful to have methods checking the invisibility of the inserted data or at least, checking... Sample PDF
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms
Chapter 10
Maciej Liskiewicz, Ulrich Wölfel
This chapter provides an overview, based on current research, on theoretical aspects of digital steganography— a relatively new field of computer... Sample PDF
Computational Aspects of Digital Steganography
Chapter 11
Christopher B. Smith, Sos S. Agaian
Steganalysis is the art and science of detecting hidden information. Modern digital steganography has created techniques to embed information near... Sample PDF
On Steganalysis and Clean Image Estimation
Chapter 12
Hafiz Malik, Rajarathnam Chandramouli, K. P. Subbalakshmi
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared... Sample PDF
Steganalysis: Trends and Challenges
Chapter 13
Benchmarking Steganalysis  (pages 266-290)
Andrew D. Ker
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are... Sample PDF
Benchmarking Steganalysis
Chapter 14
Matthew James Sorrell
We propose that the implementation of the JPEG compression algorithm represents a manufacturer and model-series specific means of identification of... Sample PDF
Digital Camera Source Identification Through JPEG Quantisation
Chapter 15
Hongxia Jin
This chapter discusses the cryptographic traitor tracing technology that is used to defend against piracy in multimedia content distribution. It... Sample PDF
Traitor Tracing for Multimedia Forensics
Chapter 16
Dominik Engel, Thomas Stütz, Andreas Uhl
In this chapter we investigate two different techniques for transparent/perceptual encryption of JPEG2000 files or bitstreams in the context of... Sample PDF
Efficient Transparent JPEG2000 Encryption
About the Contributors