Advanced Statistical Steganalysis [electronic resource] /by Rainer Böhme.
by Böhme, Rainer [author.]; SpringerLink (Online service).
Material type:
Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
TA1637-1638 (Browse shelf) | Available | ||||
Long Loan | MAIN LIBRARY | TA1637-1638 (Browse shelf) | Available |
Browsing MAIN LIBRARY Shelves Close shelf browser
TK5105.5-5105.9 Networked Digital Technologies | TK5105.5-5105.9 Networked Digital Technologies | QA8.9-QA10.3 A 25-Year Perspective on Logic Programming | TA1637-1638 Advanced Statistical Steganalysis | HD28-70 Organizations | HF54.5-54.56 Exploring Services Science | QA8.9-QA10.3 The Mathematics of Language |
Background and Advances in Theory -- Principles of Modern Steganography and Steganalysis -- Towards a Theory of Cover Models -- Specific Advances in Steganalysis -- Detection of Model-Based Steganography with First-Order Statistics -- Models of Heterogeneous Covers for Quantitative Steganalysis -- Improved Weighted Stego Image Steganalysis -- Using Encoder Artefacts for Steganalysis of Compressed Audio Streams -- Synthesis -- General Discussion.
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.
There are no comments for this item.