Journal ArticleDOI
Spread spectrum image steganography
TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.Abstract:
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.read more
Citations
More filters
Patent
Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments
TL;DR: In this article, a distributed model for digital distribution of content which combines the security of a digital watermark with efficient barter mechanisms for handling the actual delivery of digital goods is proposed.
Proceedings ArticleDOI
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming
TL;DR: Experiments show the proposed method can achieve higher embedding payload while keeping smaller distortion, and dynamic programming is performed to find the optimum substitution depth vector.
Patent
Mobile security using graphical images
TL;DR: In this paper, a wireless communication device receives a first user input indicating a function to lock, followed by a second user indicating a geometric pattern, and then a third and fourth user inputs indicating individual positions of the graphical images on the geometric pattern.
Journal Article
A Coding-Based Steganography Using Multiple Frequency Domains
Omed Salim Khalind وميد سليم خلند,رؤوف سمكو آصف Raoof Smko Assef,Ahmed Tariq Sadiq أحمد طارق صادق +2 more
TL;DR: A new technique for hiding text in a bitmap images based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves in an arbitrary chosen bitmap image is presented.
Journal Article
Survey on Wavelet based ECG Stegnography for Protecting Patients Confidential Information
Muhusina Ismail,Shiney Thomas +1 more
TL;DR: A wavelet-based steganography technique which combines encryption and scrambling technique to protect patient confidential data is introduced and it is proved that host signal will not affect any distortion and is less than 1%.
References
More filters
Journal ArticleDOI
De-noising by soft-thresholding
TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book
Fundamentals of digital image processing
TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.