Skip to content

Your Cart


You have 0 items in your cart.

Register Sign in Wishlist

Steganography in Digital Media
Principles, Algorithms, and Applications

$118.00 (P)

  • Date Published: December 2009
  • availability: Available
  • format: Hardback
  • isbn: 9780521190190

$ 118.00 (P)

Add to cart Add to wishlist

Other available formats:

Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact providing details of the course you are teaching.

Product filter button
About the Authors
  • Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.

    • Real media files are provided so that readers can see how the techniques work in practice
    • Includes pseudo-code to help with the implementation of practical algorithms
    • Each chapter ends with carefully chosen exercises supplied with hints to jump-start the problem solving process
    Read more

    Reviews & endorsements

    "...the book is excellent for teaching the subject of information hiding or security related courses. It enhances the landscape of textbooks on the subject. I am convinced that it will grip the reader as it touches on the most important aspects of steganography and steganalysis."

    - Wojciech Mazurczyk, IEEE Communications Magazine

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: December 2009
    • format: Hardback
    • isbn: 9780521190190
    • length: 466 pages
    • dimensions: 244 x 170 x 25 mm
    • weight: 0.94kg
    • contains: 20 b/w illus. 20 tables 52 exercises
    • availability: Available
  • Table of Contents

    1. Introduction
    2. Digital image formats
    3. Digital image acquisition
    4. Steganographic channel
    5. Naive steganography
    6. Steganographic security
    7. Practical steganographic methods
    8. Matrix embedding
    9. Non-shared selection channel
    10. Steganalysis
    11. Selected targeted attacks
    12. Blind steganalysis
    13. Steganography
    A. Statistics
    B. Information theory
    C. Linear codes
    D. Signal detection and estimation
    E. Support vector machines

  • Author

    Jessica Fridrich, State University of New York, Binghamton
    Jessica Fridrich is Professor of Electrical and Computer Engineering at Binghamton University, State University of New York (SUNY), where she has worked since receiving her PhD from there in 1995. Since then, her research on data embedding and steganalysis has led to more than 85 papers and seven US patents. She also received the SUNY Chancellor's Award for Excellence in Research in 2007 and Award for Outstanding Inventor in 2002. Her main research interests are in steganography and steganalysis of digital media, digital watermarking, and digital image forensics.

Sign In

Please sign in to access your account


Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.