1. Introduction

  1. Hans Georg Schaathun

Published Online: 22 AUG 2012

DOI: 10.1002/9781118437957.ch1

Machine Learning in Image Steganalysis

Machine Learning in Image Steganalysis

How to Cite

Schaathun, H. G. (2012) Introduction, in Machine Learning in Image Steganalysis, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9781118437957.ch1

Author Information

  1. Ålesund University College, Norway

Publication History

  1. Published Online: 22 AUG 2012
  2. Published Print: 21 AUG 2012

ISBN Information

Print ISBN: 9780470663059

Online ISBN: 9781118437957



  • steganography, real threat or hype;
  • hiding detailed plans/maps/photos within images;
  • steganography, suspicion aroused with link, the encrypted;
  • use of steganography in the jihad;
  • machine learning and AI;
  • steganalysis, mapping objects to classes, in pattern recognition;
  • machine learning, an alternative to analytic approach;
  • black box learning algorithms in steganalysis;
  • classifier, and learning acquired, for classifying the unseen


This chapter contains sections titled:

  • Real Threat or Hype?

  • Artificial Intelligence and Learning

  • How to Read this Book