Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Steganography and Steganalysis

Steganography and Steganalysis
View Sample PDF
Author(s): Merrill Warkentin (Mississippi State University, USA), Mark B. Schmidt (St. Cloud State University, USA) and Ernest Bekkering (Northeastern State University, USA)
Copyright: 2008
Pages: 7
Source title: Intellectual Property Protection for Multimedia Information Technology
Source Author(s)/Editor(s): Hideyasu Sasaki (Ritsumeikan University, Japan)
DOI: 10.4018/978-1-59904-762-1.ch019


View Steganography and Steganalysis on the publisher's website for pricing and purchasing information.


In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent. Though the focus on use of steganography for criminal and terrorist purposes detracts from the potential use for legitimate purposes, the focus in this chapter is on its role as a security threat. The history of stenography as a tool for covert purposes is addressed. Recent technical innovations in computerized steganography are presented, and selected widely available steganography tools are presented. Finally, a brief discussion of the role of steganalysis is presented.

Related Content

Ben van Lier. © 2018. 21 pages.
Jose-Luis Perez-Trivino. © 2018. 18 pages.
Gabriel R. Ricci. © 2018. 20 pages.
Tommaso Bertolotti, Selene Arfini, Lorenzo Magnani. © 2018. 14 pages.
Francesco Albert Bosco Cortese. © 2018. 31 pages.
Lambèr Royakkers, Peter Olsthoorn. © 2018. 18 pages.
John Forge. © 2018. 11 pages.
Body Bottom