scispace - formally typeset
Journal ArticleDOI

Spread spectrum image steganography

TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

read more

Citations
More filters
Patent

Obfuscating data stored in a dispersed storage network

TL;DR: In this paper, a distributed storage error encoding (SDE) method is proposed to encode secret data in accordance with first dispersed storage error (SSE) encoding parameters to produce at least one set of encoded secret slices, and second dispersed SDE encoding (DSE) to produce a plurality of sets of encoded data slices.
Book ChapterDOI

Robust approaches to 3d object secret sharing

TL;DR: It is shown that encoding 3D models using lossless data compression algorithms prior to secret sharing helps reduce share sizes and remove redundancies and patterns that possibly ease cryptanalysis.

Universal Image Steganalytic Method

TL;DR: The aim of the paper was to analyze the variety in accuracy of detection results (ACR) while detecting testing steganographic algorithms as F5, Outguess, Model Based Steganography without deblocking, JP Hide&Seek which represent the generally used steganography tools.
Journal ArticleDOI

Visual detection of LSB-encoded natural image steganography

TL;DR: This study examined whether humans could detect least-significant bit steganography in 15 color natural images from the VisTex database using a controlled same/different task and a yes/no task and found layers 1--3 appear to be highly resistant to visual steganalysis.
Proceedings ArticleDOI

Channel models for high-capacity information hiding in images

TL;DR: This paper considers the scenario of blind information hiding in images as a communications channel, where the channel noise is caused by the embedding and blind extraction method as well as by any lossy compression method utilized to store and transmit the image.
References
More filters
Journal ArticleDOI

De-noising by soft-thresholding

TL;DR: The authors prove two results about this type of estimator that are unprecedented in several ways: with high probability f/spl circ/*/sub n/ is at least as smooth as f, in any of a wide variety of smoothness measures.
Book

Fundamentals of digital image processing

TL;DR: This chapter discusses two Dimensional Systems and Mathematical Preliminaries and their applications in Image Analysis and Computer Vision, as well as image reconstruction from Projections and image enhancement.
Journal ArticleDOI

Error bounds for convolutional codes and an asymptotically optimum decoding algorithm

TL;DR: The upper bound is obtained for a specific probabilistic nonsequential decoding algorithm which is shown to be asymptotically optimum for rates above R_{0} and whose performance bears certain similarities to that of sequential decoding algorithms.
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.