scispace - formally typeset
Journal ArticleDOI

Spread spectrum image steganography

TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

read more

Citations
More filters
Journal ArticleDOI

Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques

TL;DR: The fold phase distribution DPSK concept is developed to obtain more than 1.5 dB quality improvement and twice the noise margin than the standard DPSK technique on the same test condition.
Patent

Embedding and detecting a watermark in images

TL;DR: In this paper, a digital image signal is watermarked by locally changing geometric features of the image, e.g., a pattern of lines, and the most significant image pixels are determined and then moved to the vicinity of the line pattern.
Patent

Forensic marking using a common customization function

TL;DR: In this article, the authors describe a common customization function for forensic watermark insertion into a digital content signal using a generic transformation technique for use as a customization step for producing versions of content forensically marked with any of a multiplicity of mark messages.
Journal ArticleDOI

Phase for Face saving-a multicarrier Stego

TL;DR: The following work focuses on modulating the signal through QAM, a highly bandwidth efficient modulation technique and subsequently embedding the payload on the modulated signal during the process of signal mapping, and evaluates the system's performance via BER for different embedding levels.
Patent

Method and system for copy protection of displayed data content

TL;DR: A method for altering text displayed in a formatted page, including locating a buffer of memory locations containing contents of a page, locating a first text string between two markers within the buffer, and inserting N-M special fill characters in the N-m unfilled memory locations between the markers in order to avoid the need to move the markers closer together as discussed by the authors.
References
More filters
Journal ArticleDOI

De-noising by soft-thresholding

TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book

Fundamentals of digital image processing

TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI

Error bounds for convolutional codes and an asymptotically optimum decoding algorithm

TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.