Steganography Techniques for Digital Images (eBook)

(Autor)

eBook Download: PDF
2018 | 1st ed. 2019
XVI, 122 Seiten
Springer International Publishing (Verlag)
978-3-319-78597-4 (ISBN)

Lese- und Medienproben

Steganography Techniques for Digital Images - Abid Yahya
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.  

  • Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption;
  • Provides a variety of methods to achieve characteristic region Steganography synchronization;
  • Shows how Steganography improves upon cryptography by using obscurity features.



Professor Dr. Abid Yahya began his career on an engineering path that is rare among other Researcher executives and earned his MSc and PhD degree in Wireless & Mobile systems from the Universiti Sains Malaysia, Malaysia. Currently, he is working at Botswana International University of Science & Technology. He has applied this combination of practical and academic experience to a variety of consultancies for major corporations.

He has over 115 research publications to his credit in numerous reputable journals, conference articles and book chapters. He has received several awards and grants from various funding agencies and supervised number of PhD and Master Candidates. His new book 'LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement' has been published by Springer International Publishing Switzerland in January 2017 and is being followed in national and international universities.

Prof.  Abid Yahya was assigned as an external and internal examiner for postgraduate students. He was invited number of times as a speaker and visiting lecturer at different multinational companies. He sits on various panels with the Government and other industry related panels of study.

Prof.  Abid Yahya rewarding field research and his academic coursework, made a strong contribution to different research centers. During his work experience, he had collaborated with several international Universities and companies.

Professor Dr. Abid Yahya began his career on an engineering path that is rare among other Researcher executives and earned his MSc and PhD degree in Wireless & Mobile systems from the Universiti Sains Malaysia, Malaysia. Currently, he is working at Botswana International University of Science & Technology. He has applied this combination of practical and academic experience to a variety of consultancies for major corporations.He has over 115 research publications to his credit in numerous reputable journals, conference articles and book chapters. He has received several awards and grants from various funding agencies and supervised number of PhD and Master Candidates. His new book “LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement” has been published by Springer International Publishing Switzerland in January 2017 and is being followed in national and international universities.Prof.  Abid Yahya was assigned as an external and internal examiner for postgraduate students. He was invited number of times as a speaker and visiting lecturer at different multinational companies. He sits on various panels with the Government and other industry related panels of study.Prof.  Abid Yahya rewarding field research and his academic coursework, made a strong contribution to different research centers. During his work experience, he had collaborated with several international Universities and companies.

Dedication 5
Preface 6
Acknowledgments 8
Contents 9
About the Authors 11
List of Abbreviations 13
Chapter 1: Introduction to Steganography 15
1.1 Introduction 15
1.2 Fundamental Requirements for Steganography 17
1.3 Steganography Challenges 18
1.4 Scope of Work 19
References 20
Chapter 2: Steganography Techniques 22
2.1 Introduction 22
2.2 Background and History of Steganography 24
2.3 Steganography Practical Applications 25
2.4 Applicable Image Steganography Methods 26
2.4.1 Spatial Domain Steganographic Systems 28
2.4.2 Image Frequency Domain Steganographic Scheme 30
2.4.3 Spread Spectrum Image Steganography (SSIS) Technique 35
2.4.4 Statistical Procedures 39
2.4.5 Distortion Methods 40
2.4.6 Dossier Embedding Method 41
2.4.7 Palette Embedding 42
2.4.8 Image Generation Method 43
2.4.9 Image Element Adjustment Methods 43
2.4.10 Adaptive Steganography 44
2.5 Performance Capacity 46
2.6 Steganalysis 46
2.7 Evaluation of Previously Declared Methods 47
References 50
Chapter 3: Characteristic Region-Based Image Steganography 56
3.1 Introduction 56
3.2 Characteristic Region-Based Watermarking 57
3.2.1 SIFT Detector 57
3.3 Theoretical Framework of the Proposed Scheme 58
3.3.1 Payload Encryption 59
3.3.1.1 Blowfish Algorithm 60
3.3.1.2 Data Encryption 61
3.3.1.3 Key Schedule 62
3.3.1.4 F Function 63
3.3.1.5 Blowfish Algorithm Security and Performance 64
3.3.2 Identifying Embedding Regions Using SURF 64
3.3.3 Embedding Data Using CDF DWT 67
3.4 Developing the Proposed Algorithm 68
3.4.1 Secret Data Embedding Phase 68
3.4.2 Secret Data Extracting Stage 71
3.5 Computer Simulation and Results 71
3.6 Discussion 81
3.7 Summary 87
References 95
Chapter 4: An Enhanced Robust and Protected Image Steganographic System 97
4.1 Introduction 97
4.2 DCT-Based Image Steganography 98
4.2.1 Mali’s Embedding Procedures 99
4.2.2 Modifying Mali et al.’s Scheme 102
4.2.3 Hiding the Embedding Map 103
4.3 Improving the Robustness of Digital Image Steganography with ECC and Redundancy 106
4.3.1 DWT Quantization Scheme 107
4.3.2 Histogram Shifting 108
4.3.3 RS-Code 109
4.3.4 Adding Redundancy Bits with Interleaving 110
4.4 Computer Simulation and Results 111
4.5 Discussion and Analysis 113
4.6 Summary 121
References 122
Chapter 5: Conclusion Toward Hidden Communication 124
5.1 Conclusion 124
5.2 Steganographic Contributions 126
5.3 Recommendations 127
References 127
Appendix ASummary of the Drawbacks of the Existing Steganographic Techniques and the Benefits of the CR-BIS Algorithm 129
Index 130

Erscheint lt. Verlag 12.6.2018
Zusatzinfo XVI, 122 p. 51 illus., 39 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Characteristic Region-Based Image Steganography (CR-BIS) • digital watermarking • Discrete Wavelet Transform (DWT) • image steganography • Speeded-Up Robust Features technique (SURF) • Steganography Algorithms • Steganography Techniques
ISBN-10 3-319-78597-4 / 3319785974
ISBN-13 978-3-319-78597-4 / 9783319785974
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 5,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
69,99