13. Image Steganography

  1. Frank Y. Shih

Published Online: 4 AUG 2010

DOI: 10.1002/9780470590416.ch13

Image Processing and Pattern Recognition

Image Processing and Pattern Recognition

How to Cite

Shih, F. Y. (2010) Image Steganography, in Image Processing and Pattern Recognition, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9780470590416.ch13

Publication History

  1. Published Online: 4 AUG 2010
  2. Published Print: 12 APR 2010

ISBN Information

Print ISBN: 9780470404614

Online ISBN: 9780470590416

SEARCH

Keywords:

  • embedding security;
  • genetic algorithm (GA)-based steganography;
  • image steganography;
  • imperceptibility

Summary

Wang and Chen presented an image steganography method that utilizes a two-way block-matching procedure to search for the highest similarity block for each block of the important image. Modern techniques in steganography have far more powerful tools. Many software tools allow a paranoid sender to embed messages in digitized information, typically audio, video, or still image files that are sent to a recipient. Although steganography has attracted great interests from the military and governmental organizations, there is even a big interest shown by commercial companies to safeguard their information from piracy. Today, steganography is often used to transmit information safely and embed trademarks securely in images and music files to assure copyright. This chapter introduces types of steganography, applications of steganography, embedding security and imperceptibility, examples of steganography software, and genetic algorithm (GA)-based steganography.

Controlled Vocabulary Terms

security; steganography