ABSTRACT

This chapter explores messages of different sizes were embedded in a Joint Photographic Experts Group (JPEG) image, boys.jpg. Using steganographic techniques information can be hidden in JPEG images during the compression process. JSteg–JPeg uses the discrete cosine transform transform for embedding stego messages in multiple image formats and saves the stego-image as a JPEG image file. Acrostic writings and invisible inks used during the world wars were also early examples of steganography. Computer technology is used to embed hidden messages in images using steganographic algorithms and techniques. Businesses and corporations are also interested in steganography and steganalysis. Research in the area of steganography and steganalysis is driven by the need for protection of copyrights on digital works, detection of copyright infringement, the need for unobtrusive communication by military and intelligence agencies, and detection by law enforcement agencies of steganographic methods used in criminal activities.