Journal ArticleDOI
Spread spectrum image steganography
TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.Abstract:
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.read more
Citations
More filters
High Capacity Data Embedding System using Projection Quantization
Navdeep Kaur,Sukhjeet K. Ranade +1 more
TL;DR: The embedding algorithm is based on the quantized projection embedding method with some enhancement to achieve high embedding rates and has very high capacity as comparable to the existing techniques of DCT domain.
A Brief Study of Steganography on Different Cover Media's Using LSB Substitution Method
TL;DR: Steganography aims to increase the security of data being sent over internet and how the cover media/file is affected after the data is embedded in it using Least Significant Bit (LSB) substitution method.
Patent
Application notification and service selection using in-band signals
Andy I-Fong Yu,Ananthapadmanabhan Arasanipalai Kandhadai,Alireza Ryan Heidari,Min Wang,Jeremy Toman +4 more
TL;DR: In-band signaling may be used between two stations to determine the capabilities of the stations and/or send actionable information between the stations participating in the call as mentioned in this paper, where the receiving station detects and reacts to the in-band signals, then both stations can pass control information and data as well as enhancements between each other.
Patent
Distributed decoding of digitally encoded media signals
TL;DR: In this paper, the authors propose a distributed processing in which a first device receives and pre-processes the signal, and transmits it to a remote device for further decoding.
Book ChapterDOI
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography
Mei-Yi Wu,Yu-Kun Ho,Jia-Hong Lee +2 more
TL;DR: Experimental results show that the proposed method can remarkably reduce the distortion of the carrier images (stego-images) to other palette-based methods.
References
More filters
Journal ArticleDOI
De-noising by soft-thresholding
TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book
Fundamentals of digital image processing
TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.