Introduction to Image Steganography and Steganalysis

Introduction to Image Steganography and Steganalysis

Michiharu Niimi, Hideki Noda
ISBN13: 9781466622173|ISBN10: 1466622172|EISBN13: 9781466622180
DOI: 10.4018/978-1-4666-2217-3.ch010
Cite Chapter Cite Chapter

MLA

Niimi, Michiharu, and Hideki Noda. "Introduction to Image Steganography and Steganalysis." Multimedia Information Hiding Technologies and Methodologies for Controlling Data, edited by Kazuhiro Kondo, IGI Global, 2013, pp. 209-237. https://doi.org/10.4018/978-1-4666-2217-3.ch010

APA

Niimi, M. & Noda, H. (2013). Introduction to Image Steganography and Steganalysis. In K. Kondo (Ed.), Multimedia Information Hiding Technologies and Methodologies for Controlling Data (pp. 209-237). IGI Global. https://doi.org/10.4018/978-1-4666-2217-3.ch010

Chicago

Niimi, Michiharu, and Hideki Noda. "Introduction to Image Steganography and Steganalysis." In Multimedia Information Hiding Technologies and Methodologies for Controlling Data, edited by Kazuhiro Kondo, 209-237. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2217-3.ch010

Export Reference

Mendeley
Favorite

Abstract

This chapter reviews information hiding methods, with a focus on steganography and steganalysis. First, the authors summarize image data structures and image formats required by computers and the Internet. They then introduce several information hiding methods based on image formats including lossless (non-compression based), limited color-based image data, JPEG, and JPEG2000. The authors describe a steganographic method in detail, which is based on image segmentation using a complexity measure. They also introduce a method for applying this to palette-based image formats, reversible information hiding for grayscale images, and JPEG2000 steganography. The steganographic methods for JPEG and JPEG2000 described in this chapter give particular consideration to the naturalness of cover data. In the steganalysis section, the authors introduce two methods, i.e., a specific steganalysis method for LSB steganography and Bit-Plane Complexity Segmentation (BPCS) stegnography.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.