scispace - formally typeset
Journal ArticleDOI

Spread spectrum image steganography

TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

read more

Citations
More filters
Journal ArticleDOI

A novel image steganography scheme based on morphological associative memory and permutation schema

TL;DR: This work proposes an image steganography algorithm in transform domain based on morphological associative memory, permutation approach, and matrix encoding, and shows a high level of robustness of the algorithm against steganalysis attacks.
Journal ArticleDOI

Data security-modified AES algorithm and its applications

TL;DR: A new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128-bit key and a new technique to reposition the pixels to break the correlation between them is proposed.
Book ChapterDOI

A new approach to estimating hidden message length in stochastic modulation steganography

TL;DR: A new steganalysis approach is presented which can reliably detect the existence and accurately estimate the length of hidden message in stochastic modulation steganography and is applicable to other non-adaptive embedding algorithms where the distribution models of the stego-noise are known or can be estimated.
Journal ArticleDOI

Detection of motion vector based video steganography

TL;DR: The experimental results show that the proposed method effectively detects the data embedded in motion vector based steganographic techniques more accurately than the already existing schemes.
Journal ArticleDOI

A Technique for Secure Communication Using Message Dependent Steganography

TL;DR: A technique for secure communication between two parties Alice and Bob is presented, which uses both cryptography and steganography and encrypts the secret information using its own substitution cipher called two square reverse.
References
More filters
Journal ArticleDOI

De-noising by soft-thresholding

TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book

Fundamentals of digital image processing

TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI

Error bounds for convolutional codes and an asymptotically optimum decoding algorithm

TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.