Fundamentals of steganography

Affiliates: 0,2 $ — how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 60
Refunds: 0

Uploaded: 07.02.2006
Content: (831,79 kB)


CAUTION Book format - Microsoft Word.

In recent years, steganography finally turned from the technical art in scientific research and acquired the status of self-applied science that studies the ways and methods of concealing secret messages. With her solid scientific basis and was accompanying her steganalysis studying methods of disclosure steganographic systems. This tutorial is an introduction to modern steganologiyu, is an indivisible totality of steganography and steganalysis.
Currently steganologiya undergoing rapid development, to address the problems of steganography is not only used tools from different areas of modern mathematics, but also to develop new ones. This leads to the inevitable change in the system used in steganologii terms and concepts. Steganographic system goes into a new phase of its development. Today, it is practically not used to conceal the system data of the first generation, which do not take into account the characteristics of natural stegokonteynera storing data. There are new models and methods of steganography.
All this is due primarily to the fact that for a multitude of practical problems of information security today is not enough to make the information available to the offender (as is known, the solution of this problem is engaged in cryptography). Often, you want to hide the fact of its transmission - is the classical problem of steganography. However, not less important, and other problems that are solved by the methods of steganography. Namely, embedding digital watermarks and digital fingerprints, designed to protect the copyright and property rights to the digital information of various kinds, and the introduction of digital data identification tag, designed for example for marking objects in digital repositories of data.
Thus, to date, for a whole range of specialists it became necessary to get acquainted with the basics of modern steganologii whose task is not only the development, analysis or opposition steganography tools, but also a qualified selection of existing tools and their skillful use for specific applications of information security. Currently available publication dedicated to steganography is a science-fiction, it does not affect the mathematical aspects of the said science, or affect only narrow aspects of this science. And therefore, they can not fully ensure that these needs.

Additional information

HISTORY steganography 7
Accepted terminology 9
Basic concepts and definitions of steganography 10
Mathematical model of steganography 12
Information approach to the assessment of resistance systems 14
The information-theoretical model 16
Complexity-theoretic model 18
Reliability steganographic systems 24
Game-theoretical model 29
A game model of resistance to the active enemy attack 30
Biochemical models steganography 36
METHODS hiding information 40
Unformatted concealment methods in JPEG 41
The methods of concealment in the pictures with a palette of colors 43
The method of concealment using the least significant bits of the image data 44
The method of concealment with the lower bit palette elements 45
The method of concealment based on the presence of identical elements palette 45
The method of concealment by rearranging the elements palette 46
Format concealment methods in image files 47
Format concealment methods in files BMP 47
Format concealment methods in JPEG 48
The model of human hearing 50
Methods of hiding information in audio signals 55
The method of concealment based on the noise-like signals 60
Method of implementation with echo 63
METHODS steganalysis MULTIMEDIA container 66
Method for determining the detection threshold 68
The method of analysis 69 pairs of values
Methods to control the distortions introduced by steganographic system 70
The method of accounting dual statistics 81
Methods steganalysis audio containers 83
STEGOKOMPLEKSY, allows the use of graphics container 85
OutGuess 85
Gifshuffle 86
Nide-and-Seek 86
Black Wolf's Picture Encoder 87
Steganos 87
Steghide 88
DC-Stegano 88
Invisible Secrets 2002 90
Steganos for windows 91
Hide4PGP 91
Steghide 92
StegoWav 92
Steaghan 92
S-Tools 93
MP3Stego 94
UnderMP3Cover 94
Digital watermarks 98
Application of steganography 100
ANNEX 2 lossy compression algorithm JPEG 106
APPENDIX 3. storage format BMP bitmaps 111
References 113


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)