Steganalysis: the investigation of hidden information

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Discovering and rendering useless such covert messages is a new art form known as steganalysis. The authors provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden information.

[1]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[2]  Jerry White,et al.  for published , 1999 .

[3]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[4]  Sushil Jajodia,et al.  A Role for Digital Watermarking in Electronic Commerce , 1999 .

[5]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[6]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[7]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[8]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[9]  Theodore G. Handel,et al.  Hiding Data in the OSI Network Model , 1996, Information Hiding.

[10]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[11]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[12]  P. Strevens Iii , 1985 .

[13]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[14]  Lisa M. Marvel,et al.  Reliable Blind Information Hiding for Images , 1998, Information Hiding.

[15]  Adi Shamir,et al.  The Steganographic File System , 1998, Information Hiding.

[16]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[17]  Karsten P. Ulland,et al.  Vii. References , 2022 .

[18]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.