Image steganalysis

Fangjun Huang, Bin Li, Yun Qing Shi, Jiwu Huang, Guorong Xuan

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Scopus citations

Abstract

No matter how unbreakable an encryption algorithm is, the encrypted messages will attract an adversary's awareness. Steganography can resolve this difficulty by embedding secret data into an innocuous cover medium, such as image, video, text, audio, etc. The transmission of the innocuous medium will not arouse much suspicion. Therefore, whereas cryptography only protects the contents of the secret message, steganography conceals the very existence of secret information, making the secret communications imperceptible [6].

Original languageEnglish (US)
Title of host publicationIntelligent Multimedia Analysis for Security Applications
EditorsHusrev Taha Sencar, Sergio Velastin, Nikolaos Nikolaidis, Shiguo Lian
Pages275-303
Number of pages29
DOIs
StatePublished - 2010

Publication series

NameStudies in Computational Intelligence
Volume282
ISSN (Print)1860-949X

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Image steganalysis'. Together they form a unique fingerprint.

Cite this