Journal ArticleDOI
Applications for data hiding
TLDR
Information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of information tagging and a range of applications, including anticounterfeiting and authentication, is explored.Abstract:
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of information tagging. As a framework for illustrating these concepts, multiple-bit and midlevel image-representation information-hiding techniques are described. A range of applications, including anticounterfeiting and authentication, is explored.read more
Citations
More filters
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Patent
Integrating digital watermarks in multimedia content
TL;DR: In this paper, a copy control method for decoding auxiliary data from media signals in multimedia content decodes watermarks from different media signals and uses the watermarks to control processing of the multimedia content.
Journal ArticleDOI
Reversible data embedding into images using wavelet techniques and sorting
L. Kamstra,H.J.A.M. Heijmans +1 more
TL;DR: This paper investigates high-capacity lossless data-embedding methods that allow one to embed large amounts of data into digital images in such a way that the original image can be reconstructed from the watermarked image.
Patent
Digital asset management and linking media signals with related data using watermarks
Kevin C. Jones,Cynthia Aggson,Tony F. Rodriguez,Brian Mosher,Kenneth L. Levy,R. Hiatt,Geoffrey B. Rhoads +6 more
TL;DR: A watermark reader device reads a watermark embedded into media content and forwards the watermark information to a router, which then uses the information to find a metadata database identifier and sends the related metadata to the reader device as discussed by the authors.
Patent
Authentication watermarks for printed objects and related applications
J. Scott Carr,Burt W. Perry +1 more
TL;DR: In this article, the authors describe systems for creating and authenticating printed objects (45, 46) using authentication and copy detection watermarks, which can be implemented as the same or different watermarks.
References
More filters
Book
Vision: A Computational Investigation into the Human Representation and Processing of Visual Information
TL;DR: Marr's posthumously published Vision (1982) influenced a generation of brain and cognitive scientists, inspiring many to enter the field of visual perception as discussed by the authors, where the process of vision constructs a set of representations, starting from a description of the input image and culminating with three-dimensional objects in the surrounding environment, a central theme and one that has had farreaching influence in both neuroscience and cognitive science, is the notion of different levels of analysis.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI
Multimedia watermarking techniques
Frank Hartung,Martin Kutter +1 more
TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI
On the limits of steganography
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Book ChapterDOI
Attacks on Copyright Marking Systems
TL;DR: A number of attacks are presented that enable the information hidden by copyright marks and other information in digital pictures, video, audio and other multimedia objects to be removed or otherwise rendered unusable.