A Survey of Information Hiding

A Survey of Information Hiding

M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza
Copyright: © 2009 |Pages: 16
DOI: 10.4018/978-1-60566-262-6.ch013
(Individual Chapters)
No Current Special Offers


Establishing hidden communication is an important subject of discussion that has gained increasing importance recently, particularly with the development of the Internet. One of the methods introduced for establishing hidden communication is Steganography. Steganography is a method to hide data in a cover media so that other persons will not notice that such data is there. In this chapter steganography is introduced and its history is described. Then the major steganography methods include image, audio, video, and text steganography are reviewed.
Chapter Preview


In this section some of the steganography methods which are done until today are reviewed.

Key Terms in this Chapter

Internet Security: Techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.

Stego Media: A media such as an image containing steganography information.

Steganography: Steganography is a method to hide data in a cover media so that other persons will not notice that such data is there.

Digital Watermarking: A digital watermark is a message which is embedded into a digital content (audio, video, images or text) that can be detected or extracted later.

LSB Method: Replacing the Least Significant Bit of signal with the data.

Copyright Protection: Mechanisms that prevent data, usually digital data, from being copied.

HTML: HyperText Markup Language (HTML), is the publishing language of the World Wide Web.

Information Hiding: The science of hiding a secret message in another file. It provides a means to describe the structure of text-based information in a document.

DCT: A discrete cosine transform (DCT) is a Fourier-related transform similar to the discrete Fourier transform (DFT), but using only real numbers.

Cryptography: In cryptography, the information is encrypted with a key and only the person who has the key can decrypt and read the information. So without the key, nobody has access to that information.

Complete Chapter List

Search this Book: