skip to main content
Skip header Section
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and CountermeasuresOctober 2012
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-1-4613-6967-7
Published:05 October 2012
Pages:
157
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Cited By

  1. ACM
    Alsultan J A Triple-Bit Coding Scheme for Digital Image Watermarking Proceedings of the 2019 International Conference on Intelligent Medicine and Image Processing, (53-57)
  2. ACM
    Darvish Rouhani B, Chen H and Koushanfar F DeepSigns Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (485-497)
  3. Liu H, Liu J, Yan X, Liu L, Ding W and Jiang Y (2020). A Novel Behavior Steganography Model Based on Secret Sharing, International Journal of Digital Crime and Forensics, 11:4, (97-117), Online publication date: 1-Oct-2019.
  4. Dalal M and Juneja M (2019). A robust and imperceptible steganography technique for SD and HD videos, Multimedia Tools and Applications, 78:5, (5769-5789), Online publication date: 1-Mar-2019.
  5. ACM
    Weng X, Li Y, Chi L and Mu Y High-Capacity Convolutional Video Steganography with Temporal Residual Modeling Proceedings of the 2019 on International Conference on Multimedia Retrieval, (87-95)
  6. ACM
    Pérez Gort M, Feregrino Uribe C and Nummenmaa J A Minimum Distortion Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, (111-121)
  7. ACM
    Behloul A A blind robust image watermarking using interest points and IWT Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (139-145)
  8. Grusho A, Grusho N and Timonina E Problems of modeling in the analysis of covert channels Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security, (118-124)
  9. Kim Y, Duric Z and Richards D Towards lower bounds on embedding distortion in information hiding Proceedings of the 5th international conference on Digital Watermarking, (362-376)
  10. Duric Z, Richards D and Kim Y Minimizing the statistical impact of LSB steganography Proceedings of the Second international conference on Image Analysis and Recognition, (1175-1183)
  11. ACM
    Davidson I and Paul G Locating secret messages in images Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (545-550)
  12. Sion R, Atallah M and Prabhakar S On watermarking numeric sets Proceedings of the 1st international conference on Digital watermarking, (130-146)
Contributors
  • University of Miami
  • George Mason University

Recommendations