scispace - formally typeset
Proceedings ArticleDOI

A methodology for data hiding using images

TLDR
A method of embedding information within digital images, called spread spectrum image steganography (SSIS), along with its payload capacity is presented and the performance of the technique is illustrated.
Abstract
We present a method of embedding information within digital images, called spread spectrum image steganography (SSIS) along with its payload capacity. Steganography is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using the appropriate keys without any knowledge of the original image. The capacity of the steganographic channel is described and the performance of the technique is illustrated. Applications for such a data hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, invisible map overlays, embedded control, and revision tracking.

read more

Citations
More filters
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research

TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Patent

System and method for embedding a watermark signal that contains message data in a digital image

TL;DR: In this paper, a method for embedding a watermark signal that contains message data in a digital image represented as a two-dimensional array of pixel values, including the steps of: providing a dispersed message image having pixel values representative of the message data; modifying each pixel value of the dispersed image as a function of the corresponding pixel value in the digital image; and combining the modified dispersed message images with the digital images to produce a watermarked image.
Proceedings ArticleDOI

Biometric Inspired Digital Image Steganography

TL;DR: This paper proposes using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding.

IJCSI Publicity Board 2010

TL;DR: This paper presents a systematic analysis of a variety of different ad hoc network topologies in terms of node placement, node mobility and routing protocols through several simulated scenarios.
References
More filters
Book

Fundamentals of digital image processing

TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Spread spectrum image steganography

TL;DR: A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Proceedings ArticleDOI

Secure spread spectrum watermarking for images, audio and video

TL;DR: The watermark can be constructed to make counterfeiting almost impossible, and the same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products.