Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and counte...

Full description

Bibliographic Details
Main Authors: Johnson, Neil F., Duric, Zoran (Author), Jajodia, Sushil (Author)
Format: eBook
Language:English
Published: New York, NY Springer US 2001, 2001
Edition:1st ed. 2001
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • 1. Introduction
  • 1.1 Steganography: Hiding Information
  • 1.2 Steganography throughout History
  • 1.3 Methods for Hiding Information
  • 1.4 Attacks against Hidden Information
  • 1.5 Countermeasures Against Attacks
  • 1.6 Contributions & Future Work
  • 1.7 Organization of the Book
  • 2. Exploring Steganography
  • 2.1 Digital Images
  • 2.2 Hiding Information in Images
  • 2.3 Issues in Information Hiding
  • 2.4 Examples of Digital Image Steganography Software
  • 2.5 Comments on Steganography
  • 3. Steganalysis: Attacks Against Hidden Data
  • 3.1 Detection: Seeing the Unseen
  • 3.2 Distortion: Disabling Steganography and Watermarks
  • 3.3 Application of Steganalysis: Forensic Investigation
  • 3.4 Comments on Steganalysis
  • 4. Countermeasures to Attacks
  • 4.1 Countermeasures to Distortion
  • 4.2 Stronger Watermarks
  • 4.3 Recognition Based on Image Characteristics
  • 4.4 Recovering Watermarks from Distorted Images
  • 4.5 Comments on Countermeasures
  • Appendix A: Hiding Data in Network Traffic
  • Appendix B: Glossary of Methods to Distort Stego-Images
  • References