scispace - formally typeset
Journal ArticleDOI

Spread spectrum image steganography

TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

read more

Citations
More filters
Proceedings ArticleDOI

Mathematical approach to steganalysis

TL;DR: A mathematical approach to steganalysis is presented, which concludes that a common belief, namely, spread spectrum steganography/watermarking is secure because of the low strength, noise-like message carrier is not valid anymore within the current context.
Journal ArticleDOI

On the accuracy of hiding information metrics: counterfeit protection for education and important certificates

TL;DR: The objective of this paper is to investigate the functionality and reliability of using the current metrics, which are used to measure the distortion caused by secret data embedding, and how researchers have criticized the metrics.
Patent

Circumvention of watermark analysis in a host content

TL;DR: In this paper, the authors propose a method to thwart analysis of a watermarking system by preventing analysis of watermarks in a host content, by detecting test features of interest such that if a region of the content that includes test feature is embedded with watermark, at least one characteristic is detectable upon analysis of that region.
Patent

Digital watermark embedding and decoding using encryption keys

TL;DR: In this article, the encryption keys are used to encrypt different components of the digital watermark message, such as the mapping of the message to the host signal and scrambling carrier signals used to encode the message.
Journal ArticleDOI

High-capacity steganography using a shared colour palette

TL;DR: A new type of coding structure is proposed, which maintains a high capacity but lowers the level of noise and also the maximum size of the coding structures is limited to improve the capacity/distortion tradeoff.
References
More filters
Journal ArticleDOI

De-noising by soft-thresholding

TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book

Fundamentals of digital image processing

TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI

Error bounds for convolutional codes and an asymptotically optimum decoding algorithm

TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.