Journal ArticleDOI
Data-Hiding Codes
Pierre Moulin,Ralf Koetter +1 more
- Vol. 93, Iss: 12, pp 2083-2126
TLDR
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text and is illustrated with applications to the problem of hiding data in images.Abstract:
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics,and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data binding, and covert communications. Some of these applications imply the presence of an adversary attempting to disrupt the transmission of information to the receiver; other applications involve a noisy, generally unknown, communication channel. Our focus is on the mathematical models, fundamental principles, and code design techniques that are applicable to data hiding. The approach draws from basic concepts in information theory, coding theory, game theory, and signal processing,and is illustrated with applications to the problem of hiding data in images.read more
Citations
More filters
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
TL;DR: This paper proposes a complete practical methodology for minimizing additive distortion in steganography with general (nonbinary) embedding operation and reports extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.
Journal ArticleDOI
Commutative Encryption and Watermarking in Video Compression
TL;DR: This scheme embeds the watermark without exposing video content's confidentiality, and provides a solution for signal processing in encrypted domain, and increases the operation efficiency, since the encrypted video can be watermarked without decryption.
Journal ArticleDOI
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks
Shijun Xiang,Jiwu Huang +1 more
TL;DR: A multibit robust audio watermarking solution is presented by using the insensitivity of the audio histogram shape and the modified mean to TSM and cropping operations, and has a satisfactory robustness for those common audio signal processing operations.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Book
A wavelet tour of signal processing
TL;DR: An introduction to a Transient World and an Approximation Tour of Wavelet Packet and Local Cosine Bases.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book
Vector Quantization and Signal Compression
Allen Gersho,Robert M. Gray +1 more
TL;DR: The author explains the design and implementation of the Levinson-Durbin Algorithm, which automates the very labor-intensive and therefore time-heavy and expensive process of designing and implementing a Quantizer.