Journal ArticleDOI
Spread spectrum image steganography
TLDR
A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.Abstract:
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.read more
Citations
More filters
Journal ArticleDOI
Hiding data in images by simple LSB substitution
Chi-Kwong Chan,Lee-Ming Cheng +1 more
TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI
Information-theoretic analysis of information hiding
TL;DR: An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems and evaluating the hiding capacity, which upper-bounds the rates of reliable transmission and quantifies the fundamental tradeoff between three quantities.
Patent
Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
TL;DR: In this article, the authors present methods and systems for encoding digital watermarks into content signals, including window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing sample window to provide normalized samples.
Patent
Methods and devices for fabricating and assembling printable semiconductor elements
Ralph G. Nuzzo,John A. Rogers,Etienne Menard,Keon Jae Lee,Dahl-Young Khang,Yugang Sun,Matthew Meitl,Zhengtao Zhu +7 more
TL;DR: In this article, the authors present methods and devices for fabricating printable semiconductor elements and assembling them onto substrate surfaces, which are capable of generating a wide range of flexible electronic and optoelectronic devices and arrays of devices on polymeric materials.
Proceedings Article
An overview of image steganography.
TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications.
References
More filters
Proceedings ArticleDOI
Robust data hiding for images
TL;DR: Two schemes for hiding data in images are introduced that exploit perceptual masking properties to embed the data in an invisible manner and increase the robustness of the hidden information.
Book ChapterDOI
Trials of Traced Traitors
TL;DR: Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto '94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data.
Proceedings ArticleDOI
Fast public-key watermarking of compressed video
Frank Hartung,Bernd Girod +1 more
TL;DR: An extension of spread-spectrum watermarking is presented which enables public decoding and verification of the watermark, without at the same time giving the possibility of removing the watermarks.
Proceedings ArticleDOI
Digital image watermarking using visual models
TL;DR: A watermarking technique for digital images that is based on utilizing visual models which have been developed in the context of image compression that is shown to provide dramatic improvement over the current state-of-the-art both in terms of transparency and robustness.
Book ChapterDOI
Fractal Based Image Steganography
Paul Davern,Michael Scott +1 more
TL;DR: In this paper, a new and novel steganographic method for inserting secret information into image files is described, which allows a user to specify a visual key when hiding the secret information, which must then be used when retrieving the hidden data.