Skip to Main Content
Multimedia Security, Volume 1
book

Multimedia Security, Volume 1

by William Puech
March 2022
Beginner content levelBeginner
320 pages
8h 32m
English
Wiley-ISTE
Content preview from Multimedia Security, Volume 1

5Steganography: Embedding Data Into Multimedia Content

Patrick BAS1, Rémi COGRANNE2 and Marc CHAUMONT3

1 CRIStAL, CNRS, University of Lille, France

2 LIST3N, University of Technology of Troyes, France

3 LIRMM, Université de Montpellier, CNRS, University of Nîmes, France

This chapter presents the basic concepts in steganography. These concepts most often use digital images as a medium, but many of them can be applied to other content coming from sensors, such as sounds or videos. After a reminder of the theoretical foundations linked to steganography, we will present the fundamental principles of the field and then detail the basic methods, using image in its spatial format1 or JPEG2.

The second part of this chapter will present more advanced concepts in steganography; these concepts either allow an increase in the security, or take other practical contexts into account (e.g. the steganography of a group of images, steganography of color images or the use of a high-resolution image during embedding).

5.1. Introduction and theoretical foundations

Steganography seeks to modify the content of a document (most commonly called a “cover” document) in order to embed a message that is undetectable, by producing a steganographied document called a “stego”. The practical context of the use of steganography, presented in Simmons (1984) as “The Prisoners’ Problem”, is presented as follows: Alice seeks to transmit sensitive information to Bob over a benign communication channel (e.g. sending ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Benefits of Open Source and the Risks of Open Core

The Benefits of Open Source and the Risks of Open Core

Danese Cooper, Andy Oram
The Future of Security

The Future of Security

Christina Morillo

Publisher Resources

ISBN: 9781789450262Purchase Link