Skip to main content

Steganography Techniques for Digital Images

  • Book
  • © 2019

Overview

  • Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption
  • Provides a variety of methods to achieve characteristic region Steganography synchronization
  • Shows how Steganography improves upon cryptography by using obscurity features

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (5 chapters)

Keywords

About this book

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.  

  • Applies and discusses innovative techniques for hiding text in a digital image fileor even using it as a key to the encryption;
  • Provides a variety of methods to achieve characteristic region Steganography synchronization;
  • Shows how Steganography improves upon cryptography by using obscurity features.

Authors and Affiliations

  • Faculty of Engineering & Technology, Botswana International University of Science and Technology, Palapye, Botswana

    Abid Yahya

About the author

Professor Dr. Abid Yahya began his career on an engineering path that is rare among other Researcher executives and earned his MSc and PhD degree in Wireless & Mobile systems from the Universiti Sains Malaysia, Malaysia. Currently, he is working at Botswana International University of Science & Technology. He has applied this combination of practical and academic experience to a variety of consultancies for major corporations.

He has over 115 research publications to his credit in numerous reputable journals, conference articles and book chapters. He has received several awards and grants from various funding agencies and supervised number of PhD and Master Candidates. His new book “LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement” has been published by Springer International Publishing Switzerland in January 2017 and is being followed in national and international universities.

Prof.  Abid Yahya was assigned as an external and internal examiner for postgraduate students. He was invited number of times as a speaker and visiting lecturer at different multinational companies. He sits on various panels with the Government and other industry related panels of study.

Prof.  Abid Yahya rewarding field research and his academic coursework, made a strong contribution to different research centers. During his work experience, he had collaborated with several international Universities and companies.

Bibliographic Information

Publish with us