Useful Links
Computer Science
Cybersecurity
Steganography
1. Introduction to Steganography
2. Historical Overview of Steganography
3. Steganographic Techniques by Carrier Medium
4. Steganalysis: The Art of Detection
5. Evaluating Steganographic Systems
6. Applications and Use Cases
7. Tools and Implementation
8. Advanced and Modern Concepts
Evaluating Steganographic Systems
Key Metrics
Payload Capacity
Bits per Pixel (bpp) for Images
Bits per Sample for Audio
Bits per Frame for Video
Relative Capacity Measures
Effective Capacity
Imperceptibility (Perceptual Transparency)
Objective Quality Measures
Peak Signal-to-Noise Ratio (PSNR)
Mean Squared Error (MSE)
Structural Similarity Index (SSIM)
Universal Quality Index (UQI)
Subjective Evaluation
Human Visual System Testing
Mean Opinion Score (MOS)
Difference Mean Opinion Score (DMOS)
Psychophysical Experiments
Perceptual Quality Models
Just Noticeable Difference
Watson Perceptual Model
Sarnoff Visual Discrimination Model
Robustness against Attacks
Compression Resistance
JPEG Compression
MP3 Compression
Video Compression
Noise and Distortion Tolerance
Additive White Gaussian Noise
Salt and Pepper Noise
Blur and Sharpening
Geometric Transformations
Cropping and Resizing Effects
Rotation and Translation
Aspect Ratio Changes
Signal Processing Operations
Filtering
Enhancement
Format Conversion
Security (Undetectability)
Statistical Steganalysis Resistance
First-Order Statistics
Higher-Order Statistics
Machine Learning Detection
Key Management Security
Key Space Size
Key Distribution Security
Key Recovery Resistance
Algorithm Security
Known-Plaintext Attacks
Chosen-Plaintext Attacks
Adaptive Attacks
The Steganographic Triangle
Balancing Capacity, Security, and Robustness
Trade-Off Relationships
Optimization Constraints
Multi-Objective Optimization
Trade-Off Analysis
Pareto Optimal Solutions
Performance Boundaries
Application-Specific Requirements
Optimization Strategies
Genetic Algorithms
Particle Swarm Optimization
Simulated Annealing
Benchmarking and Testing
Standard Test Images
Performance Comparison Protocols
Statistical Significance Testing
Reproducibility Requirements
Previous
4. Steganalysis: The Art of Detection
Go to top
Next
6. Applications and Use Cases