Publisher's Synopsis
Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, language: English, abstract: Unveil the invisible world of digital secrets! This groundbreaking work delves into the fascinating realm where cryptography and steganography intertwine to safeguard and conceal information within digital images. Explore the intricate dance between security and stealth as this book meticulously dissects the art of hiding data in plain sight, specifically within the ubiquitous JPEG image format. From the fundamental principles of cryptography, encompassing single-key and public-key systems, to the nuanced techniques of steganography and watermarking, this comprehensive study lays bare the methods used to protect sensitive data. Journey through the architecture of JPEG image compression, understanding its strengths and vulnerabilities, before diving deep into the world of JPEG-based steganographic methods. Discover the inner workings of algorithms like Jsteg, F3, F4, F5, and Mod4, with a spotlight on the F5 algorithm's permutative straddling and matrix encoding, alongside the unique features of the Mod4 method. Through rigorous experimental analysis, using Matlab implementations, the book unveils the embedding capacity and image quality trade-offs inherent in these methods. A thorough statistical evaluation exposes the strengths and weaknesses of each algorithm against steganalysis attacks. But the innovation doesn't stop there! The book pioneers a novel approach, introducing F5 Shrinkage Mapping (F5_MOS) to enhance the performance of the F5 algorithm, improving embedding capacity and bolstering resistance to detection. Whether you're a cybersecurity professional, a digital forensics expert, or an avid enthusiast of information security, this book provides invaluable insights into the cutting-edge techniques used to protect and conceal data in the digital age, offering a compelling exploration of cryptography, steganography, and the ever