Journal ArticleDOI
Spread spectrum image steganography
TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.Abstract:
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.read more
Citations
More filters
Proceedings ArticleDOI
SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography
TL;DR: For any given host image and (block) transform domain of interest, the signature vector is derived that when used for spread-spectrum message embedding that maximizes the signal-to-interference-plus-noise ratio (SINR) at the output of the maximum SINR linear filter receiver.
Proceedings ArticleDOI
Digital video steganalysis exploiting collusion sensitivity
Udit Budhia,Deepa Kundur +1 more
TL;DR: An effective steganalyis technique for digital video sequences based on the collusion attack by using redundant information present in the temporal domain to detect covert messages in the form of Gaussian watermarks for cybersecurity and cyberforensics.
Proceedings ArticleDOI
JPEG compression immune steganography using wavelet transform
TL;DR: A new method of image steganography that is extremely robust against JPEG compression while allowing error free information extracting is presented, based on 2D lossless wavelet transform and convolution error correction coding.
Patent
Authenticatable image with an embedded image having a discernible physical characteristic with improved security feature
Chris W. Honsinger,David Lynn C +1 more
TL;DR: In this article, a method for printing an authenticatable image having an embedded image into a receiver having a discernible physical characteristic, such that the printed image can be used to authenticate the receiver, is described.
Journal ArticleDOI
Secure Error-Free Steganography for JPEG Images
Yeuan-Kuen Lee,Ling-Hwei Chen +1 more
TL;DR: This paper proposes a variation of the Quantization Index Modulation (QIM) for solving the prisoners' problem, and proposes a theorem to show that the error of mean intensity value of an image block caused by JPEG compression is bounded.
References
More filters
Journal ArticleDOI
De-noising by soft-thresholding
TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book
Fundamentals of digital image processing
TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.