Mobile steganography: Looking to the future

Thumbnail Image
Date
2021-12-09
Authors
Newman, Jennifer
Guan, Yong
Maxion, Roy
Wu, Min
Lin, Li
Reinders, Stephanie
Chen, Wenhao
Martin, Abby
Pierre, Seth
Wang, Yangxiao
Major Professor
Advisor
Committee Member
Journal Title
Journal ISSN
Volume Title
Publisher
Copyright 2021, The Authors
Authors
Research Projects
Organizational Units
Organizational Unit
Organizational Unit
Mathematics
Welcome to the exciting world of mathematics at Iowa State University. From cracking codes to modeling the spread of diseases, our program offers something for everyone. With a wide range of courses and research opportunities, you will have the chance to delve deep into the world of mathematics and discover your own unique talents and interests. Whether you dream of working for a top tech company, teaching at a prestigious university, or pursuing cutting-edge research, join us and discover the limitless potential of mathematics at Iowa State University!
Organizational Unit
Journal Issue
Is Version Of
Versions
Series
Department
Center for Statistics and Applications in Forensic EvidenceMathematicsElectrical and Computer Engineering
Abstract
Humans have sent secret messages for millennia. A cousin to cryptography, steganography is the art and science of sending a secret message in the open by camouflaging the message carefully. Steganography can take many shapes, and its digital form often uses a digital image or video as a cover to hide the message. With a smartphone app, image steganography is easy to use, requires no expert knowledge of the science, and can be difficult to detect. To study mobile steganography properly, one must have a suitable database. This talk presents StegoAppDB, a database of digital photographs expressly created for studying mobile steganography, that will be used in NIST’s Open Media Forensic Challenge.
Comments
The following presentation was presented at NIST First International Workshop on Open Media Forensics Challenge (OpenMFC 2021), Dec. 7 -10, 2021. Posted with permission of CSAFE.
Description
Keywords
Citation
DOI
Source
Copyright