E-Book, Englisch, 131 Seiten
Yahya Steganography Techniques for Digital Images
1. Auflage 2018
ISBN: 978-3-319-78597-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 131 Seiten
ISBN: 978-3-319-78597-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption;
Provides a variety of methods to achieve characteristic region Steganography synchronization;
Shows how Steganography improves upon cryptography by using obscurity features.
Professor Dr. Abid Yahya began his career on an engineering path that is rare among other Researcher executives and earned his MSc and PhD degree in Wireless & Mobile systems from the Universiti Sains Malaysia, Malaysia. Currently, he is working at Botswana International University of Science & Technology. He has applied this combination of practical and academic experience to a variety of consultancies for major corporations.He has over 115 research publications to his credit in numerous reputable journals, conference articles and book chapters. He has received several awards and grants from various funding agencies and supervised number of PhD and Master Candidates. His new book 'LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement' has been published by Springer International Publishing Switzerland in January 2017 and is being followed in national and international universities.Prof. Abid Yahya was assigned as an external and internal examiner for postgraduate students. He was invited number of times as a speaker and visiting lecturer at different multinational companies. He sits on various panels with the Government and other industry related panels of study.Prof. Abid Yahya rewarding field research and his academic coursework, made a strong contribution to different research centers. During his work experience, he had collaborated with several international Universities and companies.
Autoren/Hrsg.
Weitere Infos & Material
1;Dedication;5
2;Preface;6
3;Acknowledgments;8
4;Contents;9
5;About the Authors;11
6;List of Abbreviations;13
7;Chapter 1: Introduction to Steganography;15
7.1;1.1 Introduction;15
7.2;1.2 Fundamental Requirements for Steganography;17
7.3;1.3 Steganography Challenges;18
7.4;1.4 Scope of Work;19
7.5;References;20
8;Chapter 2: Steganography Techniques;22
8.1;2.1 Introduction;22
8.2;2.2 Background and History of Steganography;24
8.3;2.3 Steganography Practical Applications;25
8.4;2.4 Applicable Image Steganography Methods;26
8.4.1;2.4.1 Spatial Domain Steganographic Systems;28
8.4.2;2.4.2 Image Frequency Domain Steganographic Scheme;30
8.4.3;2.4.3 Spread Spectrum Image Steganography (SSIS) Technique;35
8.4.4;2.4.4 Statistical Procedures;39
8.4.5;2.4.5 Distortion Methods;40
8.4.6;2.4.6 Dossier Embedding Method;41
8.4.7;2.4.7 Palette Embedding;42
8.4.8;2.4.8 Image Generation Method;43
8.4.9;2.4.9 Image Element Adjustment Methods;43
8.4.10;2.4.10 Adaptive Steganography;44
8.5;2.5 Performance Capacity;46
8.6;2.6 Steganalysis;46
8.7;2.7 Evaluation of Previously Declared Methods;47
8.8;References;50
9;Chapter 3: Characteristic Region-Based Image Steganography;56
9.1;3.1 Introduction;56
9.2;3.2 Characteristic Region-Based Watermarking;57
9.2.1;3.2.1 SIFT Detector;57
9.3;3.3 Theoretical Framework of the Proposed Scheme;58
9.3.1;3.3.1 Payload Encryption;59
9.3.1.1;3.3.1.1 Blowfish Algorithm;60
9.3.1.2;3.3.1.2 Data Encryption;61
9.3.1.3;3.3.1.3 Key Schedule;62
9.3.1.4;3.3.1.4 F Function;63
9.3.1.5;3.3.1.5 Blowfish Algorithm Security and Performance;64
9.3.2;3.3.2 Identifying Embedding Regions Using SURF;64
9.3.3;3.3.3 Embedding Data Using CDF DWT;67
9.4;3.4 Developing the Proposed Algorithm;68
9.4.1;3.4.1 Secret Data Embedding Phase;68
9.4.2;3.4.2 Secret Data Extracting Stage;71
9.5;3.5 Computer Simulation and Results;71
9.6;3.6 Discussion;81
9.7;3.7 Summary;87
9.8;References;95
10;Chapter 4: An Enhanced Robust and Protected Image Steganographic System;97
10.1;4.1 Introduction;97
10.2;4.2 DCT-Based Image Steganography;98
10.2.1;4.2.1 Mali’s Embedding Procedures;99
10.2.2;4.2.2 Modifying Mali et al.’s Scheme;102
10.2.3;4.2.3 Hiding the Embedding Map;103
10.3;4.3 Improving the Robustness of Digital Image Steganography with ECC and Redundancy;106
10.3.1;4.3.1 DWT Quantization Scheme;107
10.3.2;4.3.2 Histogram Shifting;108
10.3.3;4.3.3 RS-Code;109
10.3.4;4.3.4 Adding Redundancy Bits with Interleaving;110
10.4;4.4 Computer Simulation and Results;111
10.5;4.5 Discussion and Analysis;113
10.6;4.6 Summary;121
10.7;References;122
11;Chapter 5: Conclusion Toward Hidden Communication;124
11.1;5.1 Conclusion;124
11.2;5.2 Steganographic Contributions;126
11.3;5.3 Recommendations;127
11.4;References;127
12;Appendix ASummary of the Drawbacks of the Existing Steganographic Techniques and the Benefits of the CR-BIS Algorithm;129
13;Index;130




