Chapter1: Introduction to steganography.- Chapter2: Steganography techniques.- Chapter3: Characteristic region-based image steganography.- Chapter4: An enhanced robust and protected image steganographic system.- Chapter5: Conclusion towards hidden communication.
Professor Dr. Abid Yahya began his career on an engineering path that is rare among other Researcher executives and earned his MSc and PhD degree in Wireless & Mobile systems from the Universiti Sains Malaysia, Malaysia. Currently, he is working at Botswana International University of Science & Technology. He has applied this combination of practical and academic experience to a variety of consultancies for major corporations.
He has over 115 research publications to his credit in numerous reputable journals, conference articles and book chapters. He has received several awards and grants from various funding agencies and supervised number of PhD and Master Candidates. His new book “LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement” has been published by Springer International Publishing Switzerland in January 2017 and is being followed in national and international universities.Prof. Abid Yahya was assigned as an external and internal examiner for postgraduate students. He was invited number of times as a speaker and visiting lecturer at different multinational companies. He sits on various panels with the Government and other industry related panels of study.Prof. Abid Yahya rewarding field research and his academic coursework, made a strong contribution to different research centers. During his work experience, he had collaborated with several international Universities and companies.
This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding.
Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption;
Provides a variety of methods to achieve characteristic region Steganography synchronization;
Shows how Steganography improves upon cryptography by using obscurity features.