scispace - formally typeset
Journal ArticleDOI

Applications for data hiding

TLDR
Information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of information tagging and a range of applications, including anticounterfeiting and authentication, is explored.
Abstract
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of information tagging. As a framework for illustrating these concepts, multiple-bit and midlevel image-representation information-hiding techniques are described. A range of applications, including anticounterfeiting and authentication, is explored.

read more

Citations
More filters
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Patent

Integrating digital watermarks in multimedia content

TL;DR: In this paper, a copy control method for decoding auxiliary data from media signals in multimedia content decodes watermarks from different media signals and uses the watermarks to control processing of the multimedia content.
Journal ArticleDOI

Reversible data embedding into images using wavelet techniques and sorting

TL;DR: This paper investigates high-capacity lossless data-embedding methods that allow one to embed large amounts of data into digital images in such a way that the original image can be reconstructed from the watermarked image.
Patent

Digital asset management and linking media signals with related data using watermarks

TL;DR: A watermark reader device reads a watermark embedded into media content and forwards the watermark information to a router, which then uses the information to find a metadata database identifier and sends the related metadata to the reader device as discussed by the authors.
Patent

Authentication watermarks for printed objects and related applications

TL;DR: In this article, the authors describe systems for creating and authenticating printed objects (45, 46) using authentication and copy detection watermarks, which can be implemented as the same or different watermarks.
References
More filters
Book

Vision: A Computational Investigation into the Human Representation and Processing of Visual Information

David Marr
TL;DR: Marr's posthumously published Vision (1982) influenced a generation of brain and cognitive scientists, inspiring many to enter the field of visual perception as discussed by the authors, where the process of vision constructs a set of representations, starting from a description of the input image and culminating with three-dimensional objects in the surrounding environment, a central theme and one that has had farreaching influence in both neuroscience and cognitive science, is the notion of different levels of analysis.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI

On the limits of steganography

TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Book ChapterDOI

Attacks on Copyright Marking Systems

TL;DR: A number of attacks are presented that enable the information hidden by copyright marks and other information in digital pictures, video, audio and other multimedia objects to be removed or otherwise rendered unusable.