Research Catalog

Title
  • Information hiding : steganography and watermarking : attacks and countermeasures / by Neil F. Johnson, Zoran Duric, Sushil Jajodia.
Author
Johnson, Neil F.
Publication
Boston : Kluwer Academic, c2001.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance QA76.9.A25 J25 2001Off-site

Holdings

Details

Additional Authors
  • Duric, Zoran
  • Jajodia, Sushil.
Description
xx, 137 p. : ill.; 25 cm.
Summary
  • "Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents important research contributions in three fundamental areas: investigation of data hiding and labeling techniques (steganography and watermarking), attacks against steganography and watermarked information, and countermeasures to such attacks. With the proliferation of multimedia and concerns of privacy on the Internet, such research has become even more pressing. Information is collected by numerous organizations and the nature of digital media allows for the exact duplication of material with no notification that the material has been copied.
  • "Techniques for hiding information have existed for centuries. Methods include communication via invisible inks, microdots, covert channels, and spread spectrum channels. The techniques explored by the authors involved embedding information within digital media, specifically digital images. The authors analyze the limitations of these digital methods, which can in turn be used to devise attacks. The goal of these attacks is to expose the existence of a secret message or to render a digital watermark unusable. Finally, in assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.
  • The more information placed in the public's reach on the Internet, the more owners of such information need to protect themselves from unwanted surveillance, theft, and false representation and reproduction. Systems to analyze techniques for uncovering hidden information and recovering seemingly destroyed information are thus of great importance to many groups, including law enforcement authorities in computer forensics and digital traffic analysis."
  • Understanding the limitations of these methods will allow the construction of more robust methods that can better survive manipulations and attacks." "Information Hiding: Steganography and Watermarking - Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry."--Jacket.
Series Statement
  • Advances in information security ; 1
Uniform Title
Advances in information security ; 1.
Subject
  • Computer security
  • Data protection
Bibliography (note)
  • Includes bibliographical references (p. [123]-127) and index.
Processing Action (note)
  • committed to retain
Contents
Steganography: Hiding Information -- Steganography throughout History -- Methods for Hiding Information -- Hiding in Text -- Hiding in Disk Space -- Hiding in Network Packets -- Hiding in Software and Circuitry -- Hiding in Audio and Images -- Attacks against Hidden Information -- Detection -- Distortion and Removal -- Countermeasures Against Attacks -- Contributions and Future Work -- Organization of the Book -- Exploring Steganography -- Digital Images -- Hiding Information in Images -- Hiding Data in the Noise -- Watermarking Techniques -- Issues in Information Hiding -- Level of Visibility: Perceptible or Imperceptible -- Robustness vs. Payload -- Spatial or transform domain -- File Format Dependence -- Image Modeling -- Summary of Hiding Techniques -- Examples of Digital Image Steganography Software -- StegoDos -- White Noise Storm -- S-Tools -- Comments on Other Software -- Summary of Tools -- Comments on Steganography -- Steganalysis: Attacks Against Hidden Data -- Detection: Seeing the Unseen -- Techniques for Detecting Hidden Information -- Examples of Detecting Signatures in Stego-Images -- S-Tools -- Mandelsteg -- Hide and Seek -- Hide4PGP -- EzStego, Stego On-line -- Jsteg-Jpeg -- Distortion: Disabling Steganography and Watermarks -- Techniques for Distorting Embedded Data -- Examples of Distorting Embedded Information -- Application of Steganalysis: Forensic Investigation -- Comments on Steganalysis -- Countermeasures to Attacks -- Countermeasures to Distortion -- Stronger Watermarks.
ISBN
0792372042 (alk. paper)
LCCN
^^^00046213^
OCLC
44932323
Owning Institutions
Harvard Library