Freshly Printed - allow 8 days lead
Steganography in Digital Media
Principles, Algorithms, and Applications
Understand the building blocks of covert communication in digital media and apply the techniques in practice with this self-contained guide.
Jessica Fridrich (Author)
9780521190190, Cambridge University Press
Hardback, published 12 November 2009
466 pages, 20 b/w illus. 20 tables 52 exercises
24.4 x 17 x 2.5 cm, 0.94 kg
'The distinguishing feature of the book is that it presents not only methods of hiding information in digital media files, but also an in-depth analysis of detecting the use of such methods (steganalysis) … excellent for teaching the subject of information hiding or security related courses. it enhances the landscape of textbooks on the subject. I am convinced that it will grip the reader as it touches on the most important aspects of steganography and steganalysis.' IEEE Communications Magazine
Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.
Preface
Acknowledgments
1. Introduction
2. Digital image formats
3. Digital image acquisition
4. Steganographic channel
5. Naive steganography
6. Steganographic security
7. Practical steganographic methods
8. Matrix embedding
9. Non-shared selection channel
10. Steganalysis
11. Selected targeted attacks
12. Blind steganalysis
13. Steganography
A. Statistics
B. Information theory
C. Linear codes
D. Signal detection and estimation
E. Support vector machines
Notation
Glossary
References
Index.
Subject Areas: Communications engineering / telecommunications [TJK]