Image Steganography and Steganalysis

Image Steganography and Steganalysis

This paper provides in-depth descriptions of both steganography, the art of hiding information within other information, and its counter-technique known as steganalysis.

Tag(s): Cryptography

Publication date: 04 Aug 2008

ISBN-10: n/a

ISBN-13: n/a

Paperback: 127 pages

Views: 17,587

Type: Thesis

Publisher: n/a

License: n/a

Post time: 19 Jul 2010 07:48:15

Image Steganography and Steganalysis

Image Steganography and Steganalysis This paper provides in-depth descriptions of both steganography, the art of hiding information within other information, and its counter-technique known as steganalysis.
Tag(s): Cryptography
Publication date: 04 Aug 2008
ISBN-10: n/a
ISBN-13: n/a
Paperback: 127 pages
Views: 17,587
Document Type: Thesis
Publisher: n/a
License: n/a
Post time: 19 Jul 2010 07:48:15
Note:

The original link to the thesis' PDF file has been removed from the website of Dr. Hans Georg Schaathun (Phillip Bateman's supervisor). A copy is available at vanilla47.com, though I am not sure whether it's OK to link to it. 

Update: as in 2/7/2017, the site vanilla47.com is inaccessible and no other copies of the thesis are available anywhere (so far).

Update as in 13/2/2021, a copy of the thesis is available at CiteSeerX. 

Excerpts from the Abstract:
Philip Bateman wrote:Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. There are many different carriers for steganography but the most popular is digital images. Recently, there it has been rumoured that terrorist cells are using steganography to hide their secret plans, and subsequently it is becoming increasingly important to detect the images that contain steganography such that we can reduce foul-play. This counter-technique is known as steganalysis.

In contrast to the magnitude of papers that analyse either steganography or steganalysis techniques, this paper provides in-depth descriptions of both. It also offers a chance to put the theory into practice by way of a piece of software designed to maximise learning in the fields. The paper can therefore be split into two parts: Research, and Software Development.




About The Author(s)


No information is available for this author.

Philip Bateman

No information is available for this author.


Book Categories
Sponsors