The information hiding homepage

Information hiding

Stefan Katzenbeisser, Fabien A. P. Petitcolas (Editors)

With contributions of: Mauro Barni, Tiziano Bianchi, Rainer Böhme, Luca Caviglione, Gwenaël Doërr, Jessica Fridrich, Teddy Furon, Matthias Kirchner, Huajian Liu, Wojciech Mazurczyk, Alessandro Piva, Boris Škorić, Martin Steinebach, and Andreas Westfeld.

Foreword by Ton Kalker

Hardcover, approx. 312 pages.
Artech House Books, December 2015
ISBN 978-1608079285
(Available on Amazon.com)

Fifteen years ago we published the book Information Hiding Techniques for Steganography and Digital Watermarking, which turned out to be one of first scientific books on the topic. Back then, the field was in its infancy; the scientific community had just started to explore how information could be embedded invisibly or inaudibly in multimedia data. One of the main driving forces at that time was the desire to mark images, videos, or audio files with metadata that identified either the owner or recipient of the document. Steganography also turned out to be a key technology to counter surveillance or censorship. In the early days, many designs were ad-hoc, not based on a solid mathematical theory and repeatedly broken. Furthermore, methods to detect invisible communication, commonly referred to as steganalysis, were in their infancy.

Today, fifteen years later, it is time again to reflect the state-of-the-art in the field of information hiding. Our community now has a solid understanding of the performance and security of information hiding techniques; we have developed a mathematical theory of steganalysis and have explored new promising application domains. The present book aims to capture the state-of-the-art in various domains that are commonly subsumed under the term information hiding. Each chapter is written by renowned experts in the field and aims to give a good introduction to a specific topic. We therefore hope that the book will motivate students to consider studying this field and, of course, professors to consider adding it to their curriculum.

  • Chapter 1 Introduction to Information Hiding – 1.1 A Brief History of Information Hiding, 1.2 Disciplines of Information Hiding, 1.3 Applications of Information Hiding, 1.4 Types of Steganography, 1.5 Security of Steganographic Systems
  • Chapter 2 Multimedia Steganography – 2.1 Multimedia Covers, 2.2 Popular Embedding Operations and Building Blocks, 2.3 Minimizing Embedding Impact—A Separation Principle, 2.4 Embedding by Syndrome Trellis Coding, 2.5 Security
  • Chapter 3 Steganalysis – 3.1 Steganalysis as Signal Detection, 3.2 Image Representations, 3.3 Quantitative Steganalysis, 3.4 Special Topics, 3.5 Steganalysis in the Wide Sense
  • Chapter 4 Network Steganography – 4.1 Introduction, 4.2 Understanding Network Steganography, 4.3 Major Applications of Network Steganography, 4.4 A Review of Network Steganography Methods, 4.5 Detection and Countermeasures, 4.6 Summary
  • Chapter 5 Robust Watermarking – 5.1 Introduction, 5.2 The Content Adaptation Layer, 5.3 Spread-Spectrum Communications, 5.4 Communications with Side Information, 5.5 Watermark Synchronization Mechanisms, 5.6 Benchmarking Watermarking Systems, 5.7 Applications, 5.8 Research Outlook
  • Chapter 6 Watermarking Security – 6.1 Introduction, 6.2 Examples of Worst-Case Attacks, 6.3 How to Measure Watermarking Security, 6.4 Algorithms and Tools, 6.5 What we Know so far About Watermarking Security, 6.6 Oracle Attacks, 6.7 Protocol Attacks, 6.8 Conclusion
  • Chapter 7 Fingerprinting – 7.1 Collusion Attacks on Watermarks, 7.2 Traitor Tracing Codes, 7.3 Information-Theoretic Approach, 7.4 Universal Decoders, 7.5 Joint Decoders, 7.6 Outlook / Further Reading
  • Chapter 8 Fragile and Authentication Watermarks – 8.1 Common Challenges, 8.2 Authentication Watermarks, 8.3 Fragile Watermarks, 8.4 Semifragile Watermarks, 8.5 Reversible Watermarks, 8.6 Applications
  • Chapter 9 Media Forensics – 9.1 Objectives, 9.2 Methods, 9.3 Limitations and Outlook
  • Chapter 10 Watermarking in the Encrypted Domain – 10.1 Introduction, 10.2 A Few Preliminaries, 10.3 Asymmetric Fingerprinting Protocols, 10.4 Client-side Watermark Embedding, 10.5 Reversible Watermarking of Encrypted Content, 10.6 Summary