scispace - formally typeset
Search or ask a question

Showing papers on "Steganography published in 1998"


Journal ArticleDOI
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Abstract: In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.

1,270 citations


Journal ArticleDOI

1,220 citations


Journal ArticleDOI
01 Jun 1998
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Abstract: We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.

1,023 citations


Book ChapterDOI
14 Apr 1998
TL;DR: An information-theoretic model for steganography with passive adversaries is proposed and several secure steganographic schemes are presented; one of them is a universal information hiding scheme based on universal data compression techniques that requires no knowledge of the covertext statistics.
Abstract: An information-theoretic model for steganography with passive adversaries is proposed. The adversary’s task of distinguishing between an innocent cover message C and a modified message S containing a secret part is interpreted as a hypothesis testing problem. The security of a steganographic system is quantified in terms of the relative entropy (or discrimination) between P C and P S. Several secure steganographic schemes are presented in this model; one of them is a universal information hiding scheme based on universal data compression techniques that requires no knowledge of the covertext statistics.

882 citations


Journal ArticleDOI
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Abstract: Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spycraft family: cryptography scrambles a message so it cannot be understood while steganography hides the message so it cannot be seen. In this article the authors discuss image files and how to hide information in them, and discuss results obtained from evaluating available steganographic software. They argue that steganography by itself does not ensure secrecy, but neither does simple encryption. If these methods are combined, however, stronger encryption methods result. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. But with steganography, the interceptor may not know that a hidden message even exists. For a brief look at how steganography evolved, there is included a sidebar titled "Steganography: Some History."

644 citations


Book ChapterDOI
14 Apr 1998
TL;DR: Characteristics in current steganography software that direct the steganalyst to the existence of a hidden message are identified and the ground work of a tool for automatically detecting theexistence of hidden messages in images is introduced.
Abstract: Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.

383 citations


01 Jan 1998
TL;DR: All of the traditional steganographic techniques have limited information-hiding capacity, because the principle was to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits of a multi-valued image with the secret information.
Abstract: Steganography is a technique to hide secret information in some other data without leaving any apparent evidence of data alternation. All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10 percent of the data mounts of the vessel. This is because the principle of those techniques was either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits of a multi-valued image with the secret information.

221 citations


Proceedings ArticleDOI
TL;DR: The authors provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden information.
Abstract: The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Discovering and rendering useless such covert messages is a new art form known as steganalysis. The authors provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden information.

213 citations


Book ChapterDOI
14 Apr 1998
TL;DR: This paper describes techniques for pure steganography, in which no secret information needs to be shared before imprisonment, and a modification of an existing protocol will be shown to admit pure stegans if the warden is not allowed to modify the contents of the channel.
Abstract: The so-called prisoners’ problem, in which two individuals attempt to communicate covertly without alerting a “warden” who controls the communications channel, has taken a number of forms, adorned with various assumptions or requirements which make the problem more or less difficult. One assumption which makes the problem considerably more managable is that the participants are allowed to share some secret information (such as an encryption key) prior to imprisonment. Another assumption, which makes the problem much more difficult, is that the warden be allowed to modify messages sent between the prisoners as well as read them. This paper describes techniques for pure steganography, in which no secret information needs to be shared before imprisonment. First, a modification of an existing protocol will be shown to admit pure steganography if the warden is not allowed to modify the contents of the channel. Then, a technique will be described that allows pure steganography between two prisoners in the presence in the presence of an active (content-modifying) warden.

140 citations


Patent
29 Dec 1998
TL;DR: In this article, a steganographic method is disclosed to embed an invisible watermark into an image, which can be used for copyright protection, content authentication, or content annotation.
Abstract: A steganographic method is disclosed to embed an invisible watermark into an image. It can be used for copyright protection, content authentication or content annotation. The technique is mainly based on K-L transform. Firstly a block and cluster step (106) and cluster selection step (108) are performed to enhance the optimization of K-L transform (110) for a given image. Then a watermark is embedded (114) into the selected eigen-clusters. ECC (Error Correction Code) can be employed to reduce the embedded code error rate. The proposed method is characterized by robustness despite the degradation or modification on the watermarked content. Furthermore, the method can be extended to video, audio or other multimedia especially for multimedia databases in which the stored multimedia are categorized by their contents or classes.

130 citations


Proceedings ArticleDOI
16 Aug 1998
TL;DR: Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.
Abstract: Steganography is formulated as a game played between an information hider and an attacker. The cost function in this formulation is a conditional mutual information between the input and output of the attack channel given the host data set. Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.

Book ChapterDOI
14 Apr 1998
TL;DR: A steganographic system which embeds secret messages into a video stream whose security is established by indeterminism within the signal path is described.
Abstract: We describe a steganographic system which embeds secret messages into a video stream.We examine the signal path which typically includes discrete cosine transformation (DCT) based, lossy compression. Result is the technical realisation of a steganographic algorithm whose security is established by indeterminism within the signal path.

Patent
26 May 1998
TL;DR: A method of embedding auxiliary information into the digital representation of publication quality color-component digital data was proposed in this paper. But this method applies to all digital data for which individual values are represented by discrete numerical values, and for which a corresponding approximation known as a digital reference palette image can be made in terms of a lesser number of discrete data values.
Abstract: A method of embedding auxiliary information (14) into the digital representation of publication quality color-component digital data (10) The method applies to all digital data for which individual values are represented by discrete numerical values, and for which a corresponding approximation known as a digital reference palette image (12) can be made in terms of a lesser number of discrete digital data values The invention creates an intermediate, digital, color-component difference image (13) that allows steganographic methods (15) to hide or embed (15) the auxiliary data (14) The invention secures the auxiliary data (14) from detection and from unauthorized removal or use by means of the digital reference palette image and a steganographic key By a substantially reverse process, the embedded auxiliary data can be an authorized user The invention provides for a means to combine a removable, visible digital watermark with publication quality digital image data

Book ChapterDOI
14 Apr 1998
TL;DR: This work introduces a two-player, zero-sum, matrix game for the purpose of modeling the contest between a data-hider and aData-attacker, and solves the game for equilibria, demonstrating that the form of the solution depends on whether the permitted distortion is less than or greater than d c, the critical distortion.
Abstract: Steganography is the study of methods of concealing data in the noise of another data set Steganalysis is the field of discovering hidden data and disrupting covert channels We introduce a two-player, zero-sum, matrix game for the purpose of modeling the contest between a data-hider and a data-attacker We then solve the game for equilibria, demonstrating that the form of the solution depends on whether the permitted distortion is less than or greater than d c, the critical distortion This critical point is a simple function of several parameters which define the game We then solve two example cases to demonstrate the ideas presented in the general solution The value of the game is the amount of information that may be reliably stored in the data set

Book ChapterDOI
14 Apr 1998
TL;DR: Today watermarking of still and moving images is a wellknown technology enabling proof of authorship for the watermarked data and audio data is a large interest.
Abstract: Today watermarking of still and moving images is a wellknown technology enabling proof of authorship for the watermarked data. Similarly, there is a large interest in watermarking of audio data. Since the human auditory system is very sensitive to signal modifications, fairly elaborated schemes are required in order to perfectly/imperceptibly hide embedded data.

Proceedings ArticleDOI
18 Oct 1998
TL;DR: A method of embedding information within digital images, called spread spectrum image steganography (SSIS), along with its payload capacity is presented and the performance of the technique is illustrated.
Abstract: We present a method of embedding information within digital images, called spread spectrum image steganography (SSIS) along with its payload capacity. Steganography is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using the appropriate keys without any knowledge of the original image. The capacity of the steganographic channel is described and the performance of the technique is illustrated. Applications for such a data hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, invisible map overlays, embedded control, and revision tracking.

Journal ArticleDOI
TL;DR: Concepts and functional modules are developed in this paper to describe an abstract scheme of digital watermarking methods based on the following principles: steganography, spread spectrum communications technology, and perceptibility restriction and noise theory.

Proceedings ArticleDOI
04 Oct 1998
TL;DR: A new method of embedding information within digital images, called spread spectrum image steganography (SSIS), which conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
Abstract: We present a new method of embedding information within digital images, called spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. SSIS conceals a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using the appropriate keys without any knowledge of the original image. Image processing, error control coding, and spread spectrum techniques used to conceal the hidden data are described, and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, invisible map overlays, embedded control, and revision tracking.

Journal Article
TL;DR: The use of random phase mask allows to deccorrelate initial image and makes it unrecognized and increase the security level of the encoded image and to make it less visible.
Abstract: In this paper image cryptography and steganography performed in frequency domain using random phase mask encoding are presented. The use of random phase mask allows to deccorrelate initial image and makes it unrecognized. This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible. Finally, two keys are needed to decrypt the image. The efficiency of the proposed approach is demonstrated by the computer modeling.

Book ChapterDOI
08 Jan 1998
TL;DR: This new technique is based on a property of human vision system such that human eyes are blind to very complex binary patterns, which is the key to the large capacity steganography which uses a color image in a BMP file format.
Abstract: A new steganography (information hiding technique) is proposed. It uses a color image as the information hiding dummy image, i.e., the container, or carrier of the secret information. This new technique is not based on a programming technique, but is based on a property of human vision system such that human eyes are blind to very complex binary patterns. In other word, human can not see the effect of the data change, even if the “noise-like” portions in the bit-planes of a multi-valued image are all changed to other noise-like patterns. In order to assure this property, we made a replacement experiment of noise-like portions of a color photo with random binary patterns, and it turned out in a surprising result. This human vision property is the key to the large capacity steganography which uses a color image in a BMP file format. This new technique may open a new step to an internet communication age.

Journal ArticleDOI
TL;DR: A new document protection scheme, called Confused Document Encrypting Scheme (CDES), which owns the cheating function, and an unauthorized person cannot know whether the message he receives is the real or the cheating one.

ReportDOI
01 Jun 1998
TL;DR: This system hides and recovers messages of substantial length within digital imagery while maintaining the original image size and dynamic range and applications for such data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.
Abstract: : This report presents a new method of digital steganography, entitled Spread-Spectrum Image Steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a brief history of this art and a discussion of steganographic communication theory, the new method, SSIS, is introduced. This system hides and recovers messages of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden messages can be recovered using appropriate keys without any knowledge of the original image. Image processing, error control coding, and spread-spectrum techniques utilized are described, and the performance of the technique is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

Book ChapterDOI
14 Apr 1998
TL;DR: This paper investigates three known steganographic algorithms with respect to their robustness against four image processing operations: filtering, bitplane removal, DCT compression, and quantization and finds that those steganography algorithms often fail to recover the watermarks after the four imageprocessing operations are performed.
Abstract: Digital watermarking is the steganographic technique used to discourage the unauthorized distribution of digital media such as text, audio, still images, and video. Artists, publishers and any other individual or business that has a commercial interest in preventing illegal copies of their work are in need of a way to achieve this. There are commercial techniques available on the Internet (like Steganos) and other techniques that are being researched. A desirable watermark is undetectable and can always be recovered. The ability to be recoverable is of concern, since if the watermark is easily destroyed it is useless. This paper investigates three known steganographic algorithms with respect to their robustness against four image processing operations: filtering, bitplane removal, DCT compression, and quantization. It is found that those steganographic algorithms often fail to recover the watermarks after the four image processing operations are performed.

Journal ArticleDOI
TL;DR: The possibilities for providing forensic evidence of copyright infringement in steganography are concerned.

Book
01 Jan 1998
TL;DR: The Steganographic File System and Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System and Modeling the Security of Steganography Systems are presented.
Abstract: Steganography.- Information Hiding to Foil the Casual Counterfeiter.- Fingerprinting Digital Circuits on Programmable Hardware.- Steganography in a Video Conferencing System.- Reliable Blind Information Hiding for Images.- Cerebral Cryptography.- Other Applications.- The Steganographic File System.- Stop- and- Go-MIXes Providing Probabilistic Anonymity in an Open System.- Biometric yet Privacy Protecting Person Authentication.- On Software Protection via Function Hiding.- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.- Copyright Marking.- Robust Digital Watermarking Based on Key-Dependent Basis Functions.- Intellectual Property Protection Systems and Digital Watermarking.- Secure Copyright Protection Techniques for Digital Images.- Shedding More Light on Image Watermarks.- Continuous Steganographic Data Transmission Using Uncompressed Audio.- Attack.- Attacks on Copyright Marking Systems.- Testing Digital Watermark Resistance to Destruction.- Analysis of the Sensitivity Attack against Electronic Watermarks in Images.- Steganalysis of Images Created Using Current Steganography Software.- Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks.- Theory.- An Information-Theoretic Model for Steganography.- Steganalysis and Game Equilibria.- Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks.- Modeling the Security of Steganographic Systems.- On Public-Key Steganography in the Presence of an Active Warden.

Proceedings ArticleDOI
06 Nov 1998
TL;DR: This new algorithm presents a general method for hiding information within an image, although the strength of this algorithm lies in authentication, which is the establishment of ownership of digital information, and is a type of watermarking.
Abstract: This paper presents result of applying the minimax eigenvalue decomposition (MED), a morphology type transform, that hides data within digital images as part of a flexible, computationally robust algorithm. This new algorithm presents a general method for hiding information within an image, although the strength of this algorithm lies in authentication. Authentication is the establishment of ownership of digital information, and is a type of watermarking. While no self-authenticating techniques are currently known, the algorithm presented here provides a certain level of self-authentication regardless of the particular information embedded in the data. The algorithm is applied to ten different images acquired over the internet, three of which are included in this document. Information in the form of a binary bit stream is inserted into each image data. A measure is created to determine how close an image containing message data is to its original image. A visual comparison is also performed. Keys, or information separate from the message data that is generated by the embedding techniques, are used to establish authenticity of the image data. This is different from most current steganography techniques that rely on embedded data integrity to establish authenticity. An analysis of the results is presented.© (1998) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

01 Sep 1998
TL;DR: This reports describes several new designs for secure watermarking schemes for digital images that offer a very high degree of robustness and security with respect to image modifications including noise and lossy compression.
Abstract: : A method for hiding messages in the noise component of digital images in such a way that specific statistical characteristics of the carrier image are not disturbed is presented. The bits are injected in the secret message, taking into account the properties of the carrier image. Adaptive message hiding should be based on local properties of the carrier image. Secure steganographic techniques using digital images require message bits to be spread pseudo-randomly over the carrier image independently of the message lengths and not concentrated in the first rows or columns of the image. For this purpose, a simple but effective message-spreading algorithm based on parameterized chaotic maps was developed. The algorithm uses discretized two-dimensional chaotic maps as universal dispersers for random message scattering within the carrier image. This reports describes several new designs for secure watermarking schemes for digital images. The techniques offer a very high degree of robustness and security with respect to image modifications including noise and lossy compression. A technique is presented for overlaying the carrier image with a key-dependent image whose power is concentrated in the low frequencies. Message extraction is based on a discrete cosine transform. A second technique inserts bits into projections of image blocks onto random, smooth, orthogonal patterns individually generated for each image and user ID. This method avoids using publicly known basis functions, thereby increasing security against malicious attacks. Robustness test results against image distortion and manipulation techniques and security of attacks to removing hidden messages are presented. Patent application serial number PASN 08/986695, 8 Dec 97, Title "Digital Watermark" has been filed for this work.


Journal ArticleDOI
TL;DR: This paper presents a formal proof system for AC, and proves that the system is complete relative to that of Interval Temporal Logic on real domain.
Abstract: Internet world is characterized by many users among which are crackers and thieves. Hence, the need for a secured system to safely exchange confidential information among users across the web is required. Of such tool is steganography that simply hides the user information under other kind of information such as image so that no one suspects that a sensitive data is being transferred. This paper presents a steganography scheme with an improved capacity and enhanced security by compressing the information before embedding it under an image. This is done by encoding the message before embedding it in the blue object of the cover image components (pixels). To prove this scheme, several testing are performed and results are compared.