Steganography and Steganalysis

Steganography and Steganalysis

Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering
ISBN13: 9781591409113|ISBN10: 159140911X|ISBN13 Softcover: 9781591409120|EISBN13: 9781591409137
DOI: 10.4018/978-1-59140-911-3.ch018
Cite Chapter Cite Chapter

MLA

Warkentin, Merrill, et al. "Steganography and Steganalysis." Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, edited by Merrill Warkentin and Rayford Vaughn, IGI Global, 2006, pp. 287-294. https://doi.org/10.4018/978-1-59140-911-3.ch018

APA

Warkentin, M., Schmidt, M. B., & Bekkering, E. (2006). Steganography and Steganalysis. In M. Warkentin & R. Vaughn (Eds.), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 287-294). IGI Global. https://doi.org/10.4018/978-1-59140-911-3.ch018

Chicago

Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. "Steganography and Steganalysis." In Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, edited by Merrill Warkentin and Rayford Vaughn, 287-294. Hershey, PA: IGI Global, 2006. https://doi.org/10.4018/978-1-59140-911-3.ch018

Export Reference

Mendeley
Favorite

Abstract

In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent. Though the focus on use of steganography for criminal and terrorist purposes detracts from the potential use for legitimate purposes, the focus in this chapter is on its role as a security threat. The history of stenography as a tool for covert purposes is addressed. Recent technical innovations in computerized steganography are presented, and selected widely available steganography tools are presented. Finally, a brief discussion of the role of steganalysis is presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.