MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Information hiding : steganography and watermarking : attacks and countermeasures / Neil F. Johnson ... [et al.].

By: Johnson, Neil F. (Neil Fisher).
Contributor(s): Duric, Zoran | Jajodia, Sushil.
Material type: materialTypeLabelBookSeries: Advances in information security ; 1.Publisher: Boston : Kluwer Academic, c2001Description: xx, 137 p. : ill. ; 25 cm. + hbk.ISBN: 0792372042.Subject(s): Computer security | Data protectionDDC classification: 005.8
Contents:
Introduction -- Exploring steganography -- Steganalysis: attacks against hidden data -- Countermeasures to attacks.

Enhanced descriptions from Syndetics:

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Includes bibliographical references (pages 123-127) and index.

Introduction -- Exploring steganography -- Steganalysis: attacks against hidden data -- Countermeasures to attacks.

Table of contents provided by Syndetics

  • List of Figures (p. XIII)
  • List of Tables (p. XVII)
  • Preface (p. XIX)
  • 1. Introduction (p. 1)
  • 1.1 Steganography: Hiding Information (p. 1)
  • 1.2 Steganography throughout History (p. 2)
  • 1.3 Methods for Hiding Information (p. 4)
  • 1.3.1 Hiding in Text (p. 5)
  • 1.3.2 Hiding in Disk Space (p. 7)
  • 1.3.3 Hiding in Network Packets (p. 7)
  • 1.3.4 Hiding in Software and Circuitry (p. 7)
  • 1.3.5 Hiding in Audio and Images (p. 8)
  • 1.4 Attacks against Hidden Information (p. 8)
  • 1.4.1 Detection (p. 8)
  • 1.4.2 Distortion and Removal (p. 9)
  • 1.5 Countermeasures Against Attacks (p. 10)
  • 1.6 Contributions and Future Work (p. 11)
  • 1.7 Organization of the Book (p. 12)
  • 2. Exploring Steganography (p. 15)
  • 2.1 Digital Images (p. 15)
  • 2.2 Hiding Information in Images (p. 17)
  • 2.2.1 Hiding Data in the Noise (p. 18)
  • 2.2.2 Watermarking Techniques (p. 22)
  • 2.3 Issues in Information Hiding (p. 24)
  • 2.3.1 Level of Visibility: Perceptible or Imperceptible (p. 25)
  • 2.3.2 Robustness vs. Payload (p. 25)
  • 2.3.3 Spatial or transform domain (p. 27)
  • 2.3.4 File Format Dependence (p. 28)
  • 2.3.5 Image Modeling (p. 28)
  • 2.3.6 Summary of Hiding Techniques (p. 29)
  • 2.4 Examples of Digital Image Steganography Software (p. 30)
  • 2.4.1 StegoDos (p. 32)
  • 2.4.2 White Noise Storm (p. 34)
  • 2.4.3 S-Tools (p. 36)
  • 2.4.4 Comments on Other Software (p. 40)
  • 2.4.5 Summary of Tools (p. 43)
  • 2.5 Comments on Steganography (p. 43)
  • 3. Steganalysis: Attacks Against Hidden Data (p. 47)
  • 3.1 Detection: Seeing the Unseen (p. 48)
  • 3.1.1 Techniques for Detecting Hidden Information (p. 49)
  • 3.1.2 Examples of Detecting Signatures in Stego-Images (p. 50)
  • 3.1.3 S-Tools (p. 52)
  • 3.1.4 Mandelsteg (p. 53)
  • 3.1.5 Hide and Seek (p. 53)
  • 3.1.6 Hide4PGP (p. 54)
  • 3.1.7 EzStego, Stego On-line (p. 55)
  • 3.1.8 Jsteg-Jpeg (p. 55)
  • 3.2 Distortion: Disabling Steganography and Watermarks (p. 60)
  • 3.2.1 Techniques for Distorting Embedded Data (p. 61)
  • 3.2.2 Examples of Distorting Embedded Information (p. 62)
  • 3.3 Application of Steganalysis: Forensic Investigation (p. 73)
  • 3.4 Comments on Steganalysis (p. 74)
  • 4. Countermeasures to Attacks (p. 77)
  • 4.1 Countermeasures to Distortion (p. 78)
  • 4.2 Stronger Watermarks (p. 79)
  • 4.3 Recognition Based on Image Characteristics (p. 80)
  • 4.3.1 "Fingerprinting" Images (p. 82)
  • 4.3.2 Affine Transformations and Invariants (p. 88)
  • 4.3.3 Using Fingerprints for Recognition (p. 91)
  • 4.4 Recovering Watermarks from Distorted Images (p. 96)
  • 4.4.1 Recovery using Image Fingerprints (p. 96)
  • 4.4.2 Refinement using Normal Flow (p. 99)
  • 4.4.3 Examples of Recovering Watermarks from Images (p. 103)
  • 4.5 Comments on Countermeasures (p. 108)
  • Appendix A Hiding Data in Network Traffic (p. 111)
  • Appendix B Glossary of Methods of Distort Stego-Images (p. 117)
  • References (p. 123)
  • Index (p. 129)

Author notes provided by Syndetics

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Powered by Koha