Steganography techniques for digital images

Research output: Book/ReportBook

1 Citation (Scopus)

Abstract

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. •Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; •Provides a variety of methods to achieve characteristic region Steganography synchronization; •Shows how Steganography improves upon cryptography by using obscurity features.

Original languageEnglish
PublisherSpringer International Publishing AG
Number of pages122
ISBN (Electronic)9783319785974
ISBN (Print)9783319785356
DOIs
Publication statusPublished - Jun 12 2018
Externally publishedYes

Fingerprint

Steganography
Cryptography
Synchronization
Discrete wavelet transforms
Decoding
Communication

All Science Journal Classification (ASJC) codes

  • Engineering(all)
  • Computer Science(all)

Cite this

Yahya, Abid. / Steganography techniques for digital images. Springer International Publishing AG, 2018. 122 p.
@book{8f8d1ce43f49456c949c8bbe85181c11,
title = "Steganography techniques for digital images",
abstract = "This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. •Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; •Provides a variety of methods to achieve characteristic region Steganography synchronization; •Shows how Steganography improves upon cryptography by using obscurity features.",
author = "Abid Yahya",
year = "2018",
month = "6",
day = "12",
doi = "10.1007/978-3-319-78597-4",
language = "English",
isbn = "9783319785356",
publisher = "Springer International Publishing AG",
address = "Switzerland",

}

Steganography techniques for digital images. / Yahya, Abid.

Springer International Publishing AG, 2018. 122 p.

Research output: Book/ReportBook

TY - BOOK

T1 - Steganography techniques for digital images

AU - Yahya, Abid

PY - 2018/6/12

Y1 - 2018/6/12

N2 - This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. •Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; •Provides a variety of methods to achieve characteristic region Steganography synchronization; •Shows how Steganography improves upon cryptography by using obscurity features.

AB - This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. •Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; •Provides a variety of methods to achieve characteristic region Steganography synchronization; •Shows how Steganography improves upon cryptography by using obscurity features.

UR - http://www.scopus.com/inward/record.url?scp=85053499171&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053499171&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-78597-4

DO - 10.1007/978-3-319-78597-4

M3 - Book

AN - SCOPUS:85053499171

SN - 9783319785356

BT - Steganography techniques for digital images

PB - Springer International Publishing AG

ER -