Y. Q. Shi
Data hiding has drawn extensive interest in the past decade. The availability of various data hiding algorithms, together with prevailing digital multimedia and transportational networks, in particular the Internet, has made covert communications a reality in this digital age. In other words, modern steganography has been feasible and can be carried out rather efficiently. As a result, an effective way to detect covert communications, i.e., the first and very important step of steganalysis, is called for. The applications of steganalysis include combating illegal distribution of child pornography that is embedded into normal images and videos, or intercepting covert communications among terrorists. In addition, steganalysis can serve as an efficient way to evaluate the security performance of various steganographic techniques. The relationship between steganography and steganalysis is just like that between missile and anti-missile, i.e., the measure and countermeasure. This tutorial presents the fundamental concepts, standard algorithms and future research issues in the area of steganography and steganalysis. Specifically, we first introduce the basic concepts of steganography and steganalysis and their applications. Then, we describe typical modern steganographic techniques such as Outguess, F5 and Model-Based. We then present the most powerful prior-art of universal steganalysis schemes and the most powerful prior art of steganalysis scheme aiming for detection of JPEG images. Newer steganalysis schemes that outperform the prior art schemes by a significant margin will also be presented and analyzed, and future research directions will be discussed.