Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Wiley Interdisciplin...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Wiley Interdisciplinary Reviews Computational Statistics
Article . 2011 . Peer-reviewed
License: Wiley Online Library User Agreement
Data sources: Crossref
versions View all 1 versions
addClaim

Image steganography and steganalysis

Authors: Mayra Bachrach; Frank Y. Shih;

Image steganography and steganalysis

Abstract

AbstractImage steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today's digital world where information is often and easily exchanged through the Internet, email, and other means using computers. The need for better methods and techniques which can be used both to embed hidden information in images and to detect messages hidden in images is driving new research in the area of steganography and steganalysis. This article surveys image steganography and steganalysis. The aim is to introduce the uninformed reader to image steganography and steganalysis. The key concepts behind image steganography and steganalysis are explained. The history and origin of steganography are outlined. Steganography is compared with watermarking in technique and intent. Details of how images are represented are explained. Methods and algorithms used to embed messages in images and to detect embedded messages are explored. Currently available steganography and steganalysis tools are explained. A demonstration of how to embed hidden information in an image using available steganography tools is provided. WIREs Comp Stat 2011 3 251–259 DOI: 10.1002/wics.152This article is categorized under: Data: Types and Structure > Image and Spatial Data

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    8
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
8
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!