TY - CHAP
T1 - Image steganalysis
AU - Huang, Fangjun
AU - Li, Bin
AU - Shi, Yun Qing
AU - Huang, Jiwu
AU - Xuan, Guorong
PY - 2010
Y1 - 2010
N2 - No matter how unbreakable an encryption algorithm is, the encrypted messages will attract an adversary's awareness. Steganography can resolve this difficulty by embedding secret data into an innocuous cover medium, such as image, video, text, audio, etc. The transmission of the innocuous medium will not arouse much suspicion. Therefore, whereas cryptography only protects the contents of the secret message, steganography conceals the very existence of secret information, making the secret communications imperceptible [6].
AB - No matter how unbreakable an encryption algorithm is, the encrypted messages will attract an adversary's awareness. Steganography can resolve this difficulty by embedding secret data into an innocuous cover medium, such as image, video, text, audio, etc. The transmission of the innocuous medium will not arouse much suspicion. Therefore, whereas cryptography only protects the contents of the secret message, steganography conceals the very existence of secret information, making the secret communications imperceptible [6].
UR - http://www.scopus.com/inward/record.url?scp=77950567665&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77950567665&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-11756-5_13
DO - 10.1007/978-3-642-11756-5_13
M3 - Chapter
AN - SCOPUS:77950567665
SN - 9783642117541
T3 - Studies in Computational Intelligence
SP - 275
EP - 303
BT - Intelligent Multimedia Analysis for Security Applications
A2 - Sencar, Husrev Taha
A2 - Velastin, Sergio
A2 - Nikolaidis, Nikolaos
A2 - Lian, Shiguo
ER -