Steganography

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 31884 Experts worldwide ranked by ideXlab platform

Si Liu - One of the best experts on this subject based on the ideXlab platform.

  • Video Steganography: A review
    Neurocomputing, 2019
    Co-Authors: Yunxia Liu, Shuyang Liu, Yonghao Wang, Hongguo Zhao, Si Liu
    Abstract:

    Abstract Video Steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement of secret message transmission is becoming stricter but also video is more favored. In this paper, according to the embedded position of secret message, video Steganography is divided into three categories: intra-embedding, pre-embedding and post-embedding. Intra-embedding methods are categorized according to the video compression stages such as intra-prediction, motion vectors, pixels interpolation, transform coefficients. Pre-embedding methods are manipulated on the raw video, which can be classified into spatial and transform domains. Post-embedding methods are mainly focused on the bitstreams, which means the procedure of embedding and extraction of video Steganography are all manipulated on the compressed bit stream. Then we introduce the performance assessment for video Steganography and the future popular video Steganography including H.265 video Steganography, robust video Steganography and reversible video Steganography. And challenges are finally discussed in this paper.

Frank Y. Shih - One of the best experts on this subject based on the ideXlab platform.

  • Image Steganography and steganalysis
    Wiley Interdisciplinary Reviews: Computational Statistics, 2011
    Co-Authors: Mayra Bachrach, Frank Y. Shih
    Abstract:

    Image Steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although Steganography is not a new discipline, it has become increasingly important in today's digital world where information is often and easily exchanged through the Internet, email, and other means using computers. The need for better methods and techniques which can be used both to embed hidden information in images and to detect messages hidden in images is driving new research in the area of Steganography and steganalysis. This article surveys image Steganography and steganalysis. The aim is to introduce the uninformed reader to image Steganography and steganalysis. The key concepts behind image Steganography and steganalysis are explained. The history and origin of Steganography are outlined. Steganography is compared with watermarking in technique and intent. Details of how images are represented are explained. Methods and algorithms used to embed messages in images and to detect embedded messages are explored. Currently available Steganography and steganalysis tools are explained. A demonstration of how to embed hidden information in an image using available Steganography tools is provided. WIREs Comp Stat 2011 3 251–259 DOI: 10.1002/wics.152 For further resources related to this article, please visit the WIREs website.

Yunxia Liu - One of the best experts on this subject based on the ideXlab platform.

  • Video Steganography: A review
    Neurocomputing, 2019
    Co-Authors: Yunxia Liu, Shuyang Liu, Yonghao Wang, Hongguo Zhao, Si Liu
    Abstract:

    Abstract Video Steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement of secret message transmission is becoming stricter but also video is more favored. In this paper, according to the embedded position of secret message, video Steganography is divided into three categories: intra-embedding, pre-embedding and post-embedding. Intra-embedding methods are categorized according to the video compression stages such as intra-prediction, motion vectors, pixels interpolation, transform coefficients. Pre-embedding methods are manipulated on the raw video, which can be classified into spatial and transform domains. Post-embedding methods are mainly focused on the bitstreams, which means the procedure of embedding and extraction of video Steganography are all manipulated on the compressed bit stream. Then we introduce the performance assessment for video Steganography and the future popular video Steganography including H.265 video Steganography, robust video Steganography and reversible video Steganography. And challenges are finally discussed in this paper.

Mayra Bachrach - One of the best experts on this subject based on the ideXlab platform.

  • Image Steganography and steganalysis
    Wiley Interdisciplinary Reviews: Computational Statistics, 2011
    Co-Authors: Mayra Bachrach, Frank Y. Shih
    Abstract:

    Image Steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although Steganography is not a new discipline, it has become increasingly important in today's digital world where information is often and easily exchanged through the Internet, email, and other means using computers. The need for better methods and techniques which can be used both to embed hidden information in images and to detect messages hidden in images is driving new research in the area of Steganography and steganalysis. This article surveys image Steganography and steganalysis. The aim is to introduce the uninformed reader to image Steganography and steganalysis. The key concepts behind image Steganography and steganalysis are explained. The history and origin of Steganography are outlined. Steganography is compared with watermarking in technique and intent. Details of how images are represented are explained. Methods and algorithms used to embed messages in images and to detect embedded messages are explored. Currently available Steganography and steganalysis tools are explained. A demonstration of how to embed hidden information in an image using available Steganography tools is provided. WIREs Comp Stat 2011 3 251–259 DOI: 10.1002/wics.152 For further resources related to this article, please visit the WIREs website.

D. Merlin Gethsy - One of the best experts on this subject based on the ideXlab platform.

  • A Review on Various Approaches in Video Steganography
    Intelligent Communication Technologies and Virtual Mobile Networks, 2019
    Co-Authors: S. Raja Ratna, J. B. Shajilin Loret, D. Merlin Gethsy, P. Ponnu Krishnan, P. Anand Prabu
    Abstract:

    Steganography is the technique in which the secret messages are hidden within the data. It keeps both the data and their existence in a secure manner. It is used in various real time applications and also it enables a secure communication. Text files, images, audios, and videos are used in Steganography to conceal the communication. The main objective of this paper is to provide a general analysis on various approaches in video Steganography. It covers related works, the strength of Steganography, types of Steganography and different techniques of video Steganography. The absolute study of various techniques of video Steganography is also highlighted.

  • A Survey on Different Video Steganography Techniques
    2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018
    Co-Authors: J. Mary Jenifer, S. Raja Ratna, J. B. Shajilin Loret, D. Merlin Gethsy
    Abstract:

    Steganography is the method of hiding the secret message inside the data source. It not only keeps the information as secret but also the existence of the information is kept as secret. It is used in various fields such as defense, medical and online transactions. It is mainly used in secure communication. In Steganography, the message can be hidden in carriers such as text files, images, audios, and videos. The aim of this paper is to provide a general overview of various video Steganography techniques. It covers related works, the strength of Steganography, types of Steganography and different video Steganography techniques. The comparative analysis of various video Steganography techniques is also highlighted.