Journal ArticleDOI
Spread spectrum image steganography
TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.Abstract:
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.read more
Citations
More filters
Patent
Method and apparatus for digital watermarking
TL;DR: In this paper, a method for embedding digital watermark data in digital data contents includes the steps of obtaining a frequency coefficient of block data of digital data, obtaining a complexity of the block data, and obtaining an amount of transformation of the frequency coefficient from the complexity and the digital data.
Patent
Watermarking in an encrypted domain
Babak Tehranchi,Rade Petrovic +1 more
TL;DR: In this article, the authors proposed a scheme to embed auxiliary information in encrypted host signals using digital watermarks, without the knowledge of the encryption/decryption keys, and the embedded watermarks persist throughout the content subsequent to decryption of the content.
Proceedings ArticleDOI
Light Field Messaging With Deep Photographic Steganography
Eric Wengrowski,Kristin J. Dana +1 more
TL;DR: This work devise and train a network to jointly learn a deep embedding and recovery algorithm that requires no multi-frame synchronization and is a high-performance real-time LFM system using consumer-grade displays and smartphone cameras.
Patent
Progressive watermark decoding on a distributed computing platform
TL;DR: In this paper, a client device equipped with a digital camera, such as a PDA or cell phone, captures a digital image of a watermarked object, and pre-filters the image to isolate a portion of the image data suspected of containing a digital watermark.
Patent
Method for combining transfer functions with predetermined key creation
TL;DR: In this paper, a method for combining transfer functions with predetermined key creation is proposed, which is comprised of a transfer function-based mask set to manipulate data at the inherent granularity of the file format of the underlying digitized samples.
References
More filters
Journal ArticleDOI
De-noising by soft-thresholding
TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book
Fundamentals of digital image processing
TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.