Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and counte...
Main Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
New York, NY
Springer US
2001, 2001
|
Edition: | 1st ed. 2001 |
Series: | Advances in Information Security
|
Subjects: | |
Online Access: | |
Collection: | Springer Book Archives -2004 - Collection details see MPG.ReNa |
Table of Contents:
- 1. Introduction
- 1.1 Steganography: Hiding Information
- 1.2 Steganography throughout History
- 1.3 Methods for Hiding Information
- 1.4 Attacks against Hidden Information
- 1.5 Countermeasures Against Attacks
- 1.6 Contributions & Future Work
- 1.7 Organization of the Book
- 2. Exploring Steganography
- 2.1 Digital Images
- 2.2 Hiding Information in Images
- 2.3 Issues in Information Hiding
- 2.4 Examples of Digital Image Steganography Software
- 2.5 Comments on Steganography
- 3. Steganalysis: Attacks Against Hidden Data
- 3.1 Detection: Seeing the Unseen
- 3.2 Distortion: Disabling Steganography and Watermarks
- 3.3 Application of Steganalysis: Forensic Investigation
- 3.4 Comments on Steganalysis
- 4. Countermeasures to Attacks
- 4.1 Countermeasures to Distortion
- 4.2 Stronger Watermarks
- 4.3 Recognition Based on Image Characteristics
- 4.4 Recovering Watermarks from Distorted Images
- 4.5 Comments on Countermeasures
- Appendix A: Hiding Data in Network Traffic
- Appendix B: Glossary of Methods to Distort Stego-Images
- References