By Stefan Katzenbeisser, Fabien, A.P. Petitcolas
An intensive evaluate of steganography, the heritage of this formerly ignored part of cryptography, an outline of attainable purposes, and a survey of equipment you should use to conceal info in sleek media. DLC: Cryptography.
Read or Download Information hiding techniques for steganography and digital watermarking PDF
Best web design books
The way to version company strategies in an SOA-compliant procedure utilizing BPMN, translate them into BPEL and execute them at the SOA platform. a pragmatic consultant with real-world examples illustrating all key suggestions. This ebook is for CIOs, executives, SOA venture managers, enterprise method analysts, BPM and SOA architects, who're accountable for enhancing the potency of industrial techniques via IT, or for designing SOA.
Apache Struts 2 Web Application Development
This booklet takes a transparent method, targeting one subject in step with bankruptcy, yet interspersing different matters within the mainline textual content and in bankruptcy detours. Taking a realistic procedure, it discusses agile internet improvement utilizing Struts 2, with lots of examples for greater knowing. This publication is for Java builders who're attracted to constructing net purposes utilizing Struts.
Extra info for Information hiding techniques for steganography and digital watermarking
Example text
Presented at the 74th Convention of the AES, Berlin, 16–19 March, 1993. [52] Gerzon, M. , and P. G. Graven, "A High-Rate Buried-Data Channel for Audio CD," Journal of the Audio Engineering Society, vol. 43, no. –Feb. 1995, pp. 3–22. [53] Johnson, N. , "In Search of the Right Image: Recognition and Tracking of Images in Image Databases, Collections, and The Internet," Technical report, George Mason University, Center for Secure Information Systems, Jun. 1999. [54] Friedman, G. , "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image," IEEE Transactions on Consumer Electronics, vol.
Wendy could fool Bob by starting a public key steganography protocol or the extended protocol given above in the name of Alice. 3 Illustration of a steganographic key-exchange protocol. Courtesy of Scott Craver, reprinted from [2]. in the first step of the protocol, he cannot identify the key he received with Alice. This situation is very similar to public key cryptography, where a certification of the public key is required. In the case of pure steganography, Bob is not able to distinguish a message sent by Alice from a message by Wendy.
In some cases Wendy will correctly classify the cover, in other cases she will not detect a hidden message, making a type-II error. It is also possible that Wendy falsely detects a hidden message in a cover which does not contain information; she then makes a type-I error. Practical steganography systems try to maximize the probability β that a passive attacker makes a type-II error. An ideal system would have β = 1. In the following paragraphs we will show that perfectly secure steganography systems (provided that an attacker makes a type-I error with probability zero) possess this property.