13. Image Steganography
Published Online: 4 AUG 2010
Copyright © 2010 the Institute of Electrical and Electronics Engineers, Inc.
Image Processing and Pattern Recognition
How to Cite
Shih, F. Y. (2010) Image Steganography, in Image Processing and Pattern Recognition, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9780470590416.ch13
- Published Online: 4 AUG 2010
- Published Print: 12 APR 2010
Print ISBN: 9780470404614
Online ISBN: 9780470590416
- embedding security;
- genetic algorithm (GA)-based steganography;
- image steganography;
Wang and Chen presented an image steganography method that utilizes a two-way block-matching procedure to search for the highest similarity block for each block of the important image. Modern techniques in steganography have far more powerful tools. Many software tools allow a paranoid sender to embed messages in digitized information, typically audio, video, or still image files that are sent to a recipient. Although steganography has attracted great interests from the military and governmental organizations, there is even a big interest shown by commercial companies to safeguard their information from piracy. Today, steganography is often used to transmit information safely and embed trademarks securely in images and music files to assure copyright. This chapter introduces types of steganography, applications of steganography, embedding security and imperceptibility, examples of steganography software, and genetic algorithm (GA)-based steganography.
Controlled Vocabulary Terms