scispace - formally typeset
Search or ask a question

Showing papers by "Charles G. Boncelet published in 1998"


Journal ArticleDOI
TL;DR: It is shown that this multiresolution watermarking method is more robust to proposed methods to some common image distortions, such as the wavelet transform based image compression, image rescaling/stretching and image halftoning.
Abstract: In this paper, we introduce a new multiresolution watermarking method for digital images. The method is based on the discrete wavelet transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to proposed methods to some common image distortions, such as the wavelet transform based image compression, image rescaling/stretching and image halftoning. Moreover, the method is hierarchical.

213 citations


Book ChapterDOI
14 Apr 1998
TL;DR: A new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range is presented.
Abstract: In this paper we present a new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range. Image processing, error-control coding, and spread spectrum techniques are utilized to conceal hidden data and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, embedded control, and revision tracking.

44 citations


Proceedings ArticleDOI
18 Oct 1998
TL;DR: A method of embedding information within digital images, called spread spectrum image steganography (SSIS), along with its payload capacity is presented and the performance of the technique is illustrated.
Abstract: We present a method of embedding information within digital images, called spread spectrum image steganography (SSIS) along with its payload capacity. Steganography is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using the appropriate keys without any knowledge of the original image. The capacity of the steganographic channel is described and the performance of the technique is illustrated. Applications for such a data hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, invisible map overlays, embedded control, and revision tracking.

43 citations


Proceedings ArticleDOI
04 Oct 1998
TL;DR: A new method of embedding information within digital images, called spread spectrum image steganography (SSIS), which conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract: We present a new method of embedding information within digital images, called spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using the appropriate keys without any knowledge of the original image. Image processing, error control coding, and spread spectrum techniques used to conceal the hidden data are described, and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, invisible map overlays, embedded control, and revision tracking.

30 citations


ReportDOI
01 Jun 1998
TL;DR: This system hides and recovers messages of substantial length within digital imagery while maintaining the original image size and dynamic range and applications for such data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.
Abstract: : This report presents a new method of digital steganography, entitled Spread-Spectrum Image Steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a brief history of this art and a discussion of steganographic communication theory, the new method, SSIS, is introduced. This system hides and recovers messages of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden messages can be recovered using appropriate keys without any knowledge of the original image. Image processing, error control coding, and spread-spectrum techniques utilized are described, and the performance of the technique is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

11 citations


01 Jan 1998
TL;DR: A new method of embedding information within digital images, called Spread Spectrum Image St eg anograp h y (SSIS), which conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract: In this paper we present a new method of embedding information within digital images, called Spread Spectrum Image St eg anograp h y (SSIS) . St eg an ography, which means “covered writing” in Greek, is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using the appropriate keys without any knowledge of the original image. Image processing, error control coding, and spread spectrum techniques used to conceal the hidden data are described, and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, invisible map overlays, embedded control, and revision tracking.