Hide and seek: an introduction to steganography
Top Cited Papers
- 11 June 2003
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Security & Privacy
- Vol. 1 (3) , 32-44
- https://doi.org/10.1109/msecp.2003.1203220
Abstract
Although people have hidden secrets in plain sight-now called steganography-throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium's redundant bits (those that can be modified without destroying that medium's integrity). The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Here, we present recent research and discuss the practical application of detection algorithms and the mechanisms for getting around them.Keywords
This publication has 11 references indexed in Scilit:
- Detecting hidden messages using higher-order statistical modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A fast and effective steganalytic technique against JSteg-like algorithmsPublished by Association for Computing Machinery (ACM) ,2003
- F5—A Steganographic AlgorithmPublished by Springer Nature ,2001
- Quantization index modulation: a class of provably good methods for digital watermarking and information embeddingIEEE Transactions on Information Theory, 2001
- Probability models for clutter in natural imagesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Information hiding-a surveyProceedings of the IEEE, 1999
- Steganalysis of Images Created Using Current Steganography SoftwarePublished by Springer Nature ,1998
- On the limits of steganographyIEEE Journal on Selected Areas in Communications, 1998
- Exploring steganography: Seeing the unseenComputer, 1998
- Introduction to Coding TheoryPublished by Springer Nature ,1992