Steganography and Steganalysis of Jpeg Images
Author : Mahendra Kumar
Publisher : LAP Lambert Academic Publishing
Total Pages : 148
Release : 2011-12
ISBN 10 : 3847318683
ISBN 13 : 9783847318682
Language : EN, FR, DE, ES & NL

Steganography and Steganalysis of Jpeg Images Book Description:

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganography has advantages over cryptography since message can be communicated to the desired recipient without raising any suspicion. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. This book describes three JPEG steganography algorithms and one steganalysis algorithm. The steganography algorithms are primarily based on restoring the statistics of a JPEG image after embedding data in them which results in low detection rate as compared to other existing algorithms. The steganalysis algorithm uses second order statistical features along with machine learning to train and predict if an image contains embedded message. Steganography can be used in many applications. In commercial sector, data hiding techniques can be used to enforce copyright on a digital medium. The access control information can be embedded inside the digital medium which can eventually be verified by the media player before playing the file.


Steganography and Steganalysis of Jpeg Images
Language: en
Pages: 148
Authors: Mahendra Kumar
Categories: Cryptography
Type: BOOK - Published: 2011-12 - Publisher: LAP Lambert Academic Publishing

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganography has
Steganography and Steganalysis of Joint Picture Expert Group (JPEG) Images
Language: en
Pages:
Authors: Mahendra Kumar
Categories:
Type: BOOK - Published: 2011 - Publisher:

This algorithm outperforms other algorithms by a small margin. The small margin is due to the fact that the best known steganalysis algorithms already detect mo
Digital Watermarking
Language: en
Pages: 484
Authors: Yun Q. Shi
Categories: Computers
Type: BOOK - Published: 2008-12-18 - Publisher: Springer Science & Business Media

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007. The 24 revised full pap
Digital Watermarking
Language: en
Pages: 317
Authors: Hyoung Joong Kim
Categories: Computers
Type: BOOK - Published: 2011-01-14 - Publisher: Springer Science & Business Media

This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, K
Digital Watermarking
Language: en
Pages: 337
Authors: Anthony T. S. Ho
Categories: Computers
Type: BOOK - Published: 2009-08-06 - Publisher: Springer Science & Business Media

This book constitutes the refereed proceedings of the 8th Interntaional Workshop, IWDW 2009, held in Guildford, Surrey, UK, August 24-26, 2009. The 25 revised f
Pattern Recognition, Machine Intelligence and Biometrics
Language: en
Pages: 866
Authors: Patrick S. P. Wang
Categories: Computers
Type: BOOK - Published: 2012-02-13 - Publisher: Springer Science & Business Media

"Pattern Recognition, Machine Intelligence and Biometrics" covers the most recent developments in Pattern Recognition and its applications, using artificial int
Innovations in Bio-Inspired Computing and Applications
Language: en
Pages: 588
Authors: Václav Snášel
Categories: Technology & Engineering
Type: BOOK - Published: 2015-12-14 - Publisher: Springer

This Volume contains the papers presented during the 6th International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2015 which was
Advances in Software Engineering
Language: en
Pages: 340
Authors: Haeng-kon Kim
Categories: Computers
Type: BOOK - Published: 2010-11-26 - Publisher: Springer

Welcome to the Proceedings of the 2010 International Conference on Advanced Software Engineering and Its Applications (ASEA 2010) – one of the partnering even
ICIW2011-Proceedings of the 6th International Conference on Information Warfare and Secuirty
Language: en
Pages: 324
Authors: Leigh Armistead
Categories:
Type: BOOK - Published: 2011-03-17 - Publisher: Academic Conferences Limited

Papers from the conference covering cyberwarfare, malware, strategic information warfare, cyber espionage etc.
Transactions on Data Hiding and Multimedia Security I
Language: en
Pages: 139
Authors:
Categories: Computers
Type: BOOK - Published: 2006-10-28 - Publisher: Springer

This inaugural issue of the LNCS Transactions on Data Hiding and Multimedia Security contains five papers dealing with a wide range of topics related to multime