000 03695nam a22005175i 4500
001 978-3-642-14313-7
003 DE-He213
005 20140220084542.0
007 cr nn 008mamaa
008 100806s2010 gw | s |||| 0|eng d
020 _a9783642143137
_9978-3-642-14313-7
024 7 _a10.1007/978-3-642-14313-7
_2doi
050 4 _aTA1637-1638
050 4 _aTA1637-1638
072 7 _aUYT
_2bicssc
072 7 _aUYQV
_2bicssc
072 7 _aCOM012000
_2bisacsh
072 7 _aCOM016000
_2bisacsh
082 0 4 _a006.6
_223
082 0 4 _a006.37
_223
100 1 _aBöhme, Rainer.
_eauthor.
245 1 0 _aAdvanced Statistical Steganalysis
_h[electronic resource] /
_cby Rainer Böhme.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXVI, 288 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x1619-7100 ;
_v0
505 0 _aBackground and Advances in Theory -- Principles of Modern Steganography and Steganalysis -- Towards a Theory of Cover Models -- Specific Advances in Steganalysis -- Detection of Model-Based Steganography with First-Order Statistics -- Models of Heterogeneous Covers for Quantitative Steganalysis -- Improved Weighted Stego Image Steganalysis -- Using Encoder Artefacts for Steganalysis of Compressed Audio Streams -- Synthesis -- General Discussion.
520 _aSteganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.
650 0 _aComputer science.
650 0 _aData encryption (Computer science).
650 0 _aComputer vision.
650 1 4 _aComputer Science.
650 2 4 _aImage Processing and Computer Vision.
650 2 4 _aData Encryption.
650 2 4 _aSignal, Image and Speech Processing.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642143120
830 0 _aInformation Security and Cryptography,
_x1619-7100 ;
_v0
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14313-7
912 _aZDB-2-SCS
999 _c112449
_d112449