Journal ArticleDOI
Spread spectrum image steganography
TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.Abstract:
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.read more
Citations
More filters
Patent
Adaptive prediction filtering for encoding/decoding digital signals in media content
TL;DR: In this article, the authors proposed a method to adapt the parameters of a predictive filter or prediction function applied to the host signal based on the extent to which the signal characteristics correspond to the characteristics of the digital signal.
A secure electronic voting software application based on image steganography and cryptography
TL;DR: This chapter discusses the design and implementation of the eVote Voting System, and some of the aspects of the system that need to be improved for it to be able to be effective in the future.
Proceedings Article
CyberSleuth: Dynamic Payload and Mobility Experiment.
TL;DR: This paper considers the important issues and features of providing for revocation of code and an architecture that will support it in a wide-scale active network and describes an approach for policy composition from multiple entities, which eventually decides whether a revocation notice is authorized to act on a particular piece of code.
Journal Article
Use of Complex Discrete Signals for Steganographic Information Security
TL;DR: The method of steganographic security based on the use of complex discrete signals and technology of direct expansion of spectrum is examined, its efficiency is probed from point of the provided security, carrier capacity and amount of introduced distortions in a container-image.
Proceedings ArticleDOI
An Improved Secret Key Estimation Method for Sequential Steganography
TL;DR: An improved algorithm to detect the beginning and end of the secret message during low frequency embedding in sequential steganography through adjusting the log likelihood estimator, namely, increasing the power of the standard deviations and introducing the modulating factors, and then develops a new cumulative sum detector.
References
More filters
Journal ArticleDOI
De-noising by soft-thresholding
TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book
Fundamentals of digital image processing
TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.