On Steganalysis and Clean Image Estimation

On Steganalysis and Clean Image Estimation

Christopher B. Smith (Southwest Research Institute, USA) and Sos S. Agaian (The University of Texas at San Antonio, USA)
Copyright: © 2009 |Pages: 33
DOI: 10.4018/978-1-59904-869-7.ch011
OnDemand PDF Download:
$37.50

Abstract

Steganalysis is the art and science of detecting hidden information. Modern digital steganography has created techniques to embed information near invisibly into digital media. This chapter explores the idea of exploiting the noise-like qualities of steganography. In particular, the art of steganalysis can be defined as detecting and/or removing a very particular type of noise. This chapter first reviews a series of steganalysis techniques including blind steganalysis and targeted steganalysis methods, and highlights how clean image estimation is vital to these techniques. Each technique either implicitly or explicitly uses a clean image model to begin the process of detection. This chapter includes a review of advanced methods of clean image estimation for use in steganalysis. From these ideas of clean image estimation, the problems faced by the passive warden can be posed in a systematic way. This chapter is concluded with a discussion of the future of passive warden steganalysis.

Complete Chapter List

Search this Book:
Reset
List of Reviewers
Table of Contents
Foreword
Anthony T.S. Ho
Preface
Chang-Tsun Li
Acknowledgment
Chapter 1
Hae Yong Kim, Sergio Vicente Denser Pamboukian, Paulo Sérgio Licciardi Messeder Barreto
Data hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it... Sample PDF
Authentication Watermarkings for Binary Images
$37.50
Chapter 2
Shiguo Lian
Since the past decade, multimedia protection technologies have been attracting more and more researchers. Among them, multimedia encryption and... Sample PDF
Secure Multimedia Content Distribution Based on Watermarking Technology
$37.50
Chapter 3
Maria Calagna
The chapter illustrates watermarking based on the transform domain. It argues that transform-based watermarking is robust to possible attacks and... Sample PDF
Digital Watermarking in the Transform Domain with Emphasis on SVD
$37.50
Chapter 4
Robert Caldelli, Alessandro Piva
This chapter is devoted to the analysis of the collusion attack applied to current digital video watermarking algorithms. In particular, we analyze... Sample PDF
Digital Video Watermarking and the Collusion Attack
$37.50
Chapter 5
Nataša Terzija
The resistance of watermarking schemes against geometric distortions has been the subject of much research and development effort in the last 10... Sample PDF
A Survey of Current Watermarking Synchronization Techniques
$37.50
Chapter 6
Martin Steinebach, Patrick Wolf
Digital watermarking promises to be a mechanism for copyright protection without being a technology for copy prevention. This sometimes makes it... Sample PDF
On the Necessity of Finding Content Before Watermark Retrieval: Active Search Strategies for Localising Watermarked Media on the Internet
$37.50
Chapter 7
Fouad Khelifi, Fatih Kurugollu, Ahmed Bouridane
The problem of multiplicative watermark detection in digital images can be viewed as a binary decision where the observation is the possibility that... Sample PDF
Statistical Watermark Detection in the Transform Domain for Digital Images
$37.50
Chapter 8
Christopher B. Smith, Sos S. Agaian
Modern digital steganography has evolved a number of techniques to embed information near invisibly into digital media. Many of the techniques for... Sample PDF
On Noise, Steganography, and the Active Warden
$37.50
Chapter 9
Patrick Le Callet, Florent Autrusseau, Patrizio Campisi
In watermarking and data hiding context, it may be very useful to have methods checking the invisibility of the inserted data or at least, checking... Sample PDF
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms
$37.50
Chapter 10
Maciej Liskiewicz, Ulrich Wölfel
This chapter provides an overview, based on current research, on theoretical aspects of digital steganography— a relatively new field of computer... Sample PDF
Computational Aspects of Digital Steganography
$37.50
Chapter 11
Christopher B. Smith, Sos S. Agaian
Steganalysis is the art and science of detecting hidden information. Modern digital steganography has created techniques to embed information near... Sample PDF
On Steganalysis and Clean Image Estimation
$37.50
Chapter 12
Hafiz Malik, Rajarathnam Chandramouli, K. P. Subbalakshmi
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared... Sample PDF
Steganalysis: Trends and Challenges
$37.50
Chapter 13
Benchmarking Steganalysis  (pages 266-290)
Andrew D. Ker
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are... Sample PDF
Benchmarking Steganalysis
$37.50
Chapter 14
Matthew James Sorrell
We propose that the implementation of the JPEG compression algorithm represents a manufacturer and model-series specific means of identification of... Sample PDF
Digital Camera Source Identification Through JPEG Quantisation
$37.50
Chapter 15
Hongxia Jin
This chapter discusses the cryptographic traitor tracing technology that is used to defend against piracy in multimedia content distribution. It... Sample PDF
Traitor Tracing for Multimedia Forensics
$37.50
Chapter 16
Dominik Engel, Thomas Stütz, Andreas Uhl
In this chapter we investigate two different techniques for transparent/perceptual encryption of JPEG2000 files or bitstreams in the context of... Sample PDF
Efficient Transparent JPEG2000 Encryption
$37.50
About the Contributors