Summary
Modern information-hiding techniques conceal the existence of communication. The primary facets of information hiding, also known as data hiding, are payload size, robustness to removal, and imperceptibility of the hidden data. In general, digital techniques can be divided into three classes: invisible watermarking, steganography, and embedded data. However, it is desirable for all classes to successfully conceal the hidden information from applicable detectors. Invisible watermarking, generally employed for copyright protection, traitor tracing, and authentication, forgoes a large payload amount for stringent robustness. Steganography, used for covert communication, pursues increased payload size while sacrificing robustness. Embedding information puts little emphasis on either robustness or covertness. In this chapter, we begin by introducing the motivation for information hiding. Following a brief survey of historic and digital examples, we will delineate the classes of information by describing objectives, applications, and terminology. Detection and attacks for these systems will then be outlined, and three representative techniques will be described in depth. Lastly, concluding remarks and suggestions for further reading will be presented.
A portion of the material presented here appeared in part in the IEEE Transactions on Image Processing, 8(8):1075–1083, August 1999, and at the IEEE 3rd Annual Information Assurance Workshop, West Point, NY, June 2002.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
A. Kerckhoffs, “La cryptographie militaire,” J. Sci. Militaires 9:5–38 (1883).
U.S. Copyright Office, Library of Congress. Digital Millennium Copyright Act of 1998 (DMCA). WWW page, 1998. http://www.loc.gov/copyright/legislation/dmca.pdf.
European Parliament and Council Directive 96/9/EC. WWW page, 1996. http://europa.eu.int/ISPO/infosoc/legreg/docs/969ec.html.
Secure Digital Music Initiative, May 2001. http://www.sdmi.org.
I. Moskowitz, ed., Information Hiding, Fourth International Workshop, Lecture Notes in Computer Science, vol. 2137 (Springer-Verlag, Berlin, 2001).
Status of the paper “Reading between the lines: Lessons from the SDMI challenge.” WWW page, 2001. http://www.cs.princeton.edu/sip/sdmi/.
S.A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, and E.W. Felten, “Reading between the lines: Lessons from the SDMI challenge,” in Proceedings of the 10th USENIX Security Symposium, Washington, DC, August 2001.
D. Kahn, The Codebreakers—The Story of Secret Writing (Scribner, New York, 1967).
B. Pfitzmann, “Trials of traced traitors,” In R. Anderson, ed., Information Hiding, First International Workshop, Lecture Notes in Computer Science, vol. 1174, pages 49–64 (Springer-Verlag, Berlin, 1996).
S. Carver, N. Memon, B. Yeo, and M. Yaeung, “Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications.” IEEE J. Selected Areas Commun. 16:573–586 (1998).
S. Katzenbeisser and F. Petitcolas, eds., Information Hiding: Techniques for Steganography and Digital Watermarking. (Artech House, Inc., Norwood, MA, 2000).
F.A. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Attacks on copyright marking systems,” in D. Aucsmith, ed., Information Hiding, Second International Workshop, Lecture Notes in Computer Science, vol. 1525, pages 219–239 (Springer-Verlag, Berlin, 1998).
F.A. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process., 17(5):58–64 (2000).
S. Pereira, S. Voloshynovskiy, M. Madueo, S. Marchand-Maillet, and T. Pun, “Second generation benchmarking and application oriented evaluation,” in I. Moskowitz, ed., Information Hiding, Fourth International Workshop, Lecture Notes in Computer Science, vol. 2137 (Springer-Verlag, Berlin, 2001).
V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. Nikolaidis, and I. Pitas, “A benchmarking protocol for watermarking methods,” in Proceedings of the IEEE International Conference on Image Processing, Thessaloniki, Greece, October 2001.
J. Kelley, “Terror groups hide behind web encryption,” USA Today, June 2001. http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm.
N.F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” IEEE Computer, pages 26–34, February 1998.
J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganography in grayscale and color images,” in Proceedings of the ACM Workshop on Multimedia and Security, pages 27–30, Ottawa, Canada, October 2001.
J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility,” in Proceedings of the SPIE Multimedia Systems and Applications IV, Denver, CO, August 2001.
G.S. Lin and W.N. Lie, “A study on detecting image hiding by feature analysis,” in Proceedings of the 2001 IEEE International Symposium on Circuits and Systems, pages 149–152, Sydney, Australia, May 2001.
I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics,” IEEE Trans. Image Process., 12(2):221–229 (2003).
N. Provos and P. Honeyman, “Detecting steganographic content on the internet,” in Proceedings of the Internet Society’s Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2002.
I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., 6:1673–1687 (1997).
M.J. Jochen, L.M. Marvel, and L.L. Pollock, “MOST: A tamper detection tool for mobile Java software,” in Proceedings of the 3rd Annual Information Assurance Workshop. IEEE, June 2002.
W. Amme, N. Dalton, and J. von Ronne, “SafeTSA: A type safe and referentially secure mobile-code representation based on static single assignment form,” in Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation (PLDI-01) (ACM Press, City, 2001).
Tools Interface Standard Committee. Tools interface standard (TIS) executable and linking format specification, 1993. http://developer.intel.com/vtune/tis.htm.
D.E. Knuth, The Art of Computer Programming: Seminumerical Algorithms, volume 2 (Addison-Wesley, Reading, MA, 1981).
R. Van Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” in Proceedings of the IEEE International Conference on Image Processing, volume 2, pages 86–90, 1994.
R.B. Wolfgang and E.J. Delp, “A watermark for digital images,” in Proceedings of the IEEE International Conference on Image Processing, volume III, pages 219–222, Lausanne, Switzerland, September 1996.
R. Machado, Stego, http://www.stego.com, 2000.
Steganography information and archive. http://www.stegoarchive.com, 2003.
L.M. Marvel, C.G. Boncelet, Jr., and C.T. Retter, “Spread spectrum image steganography,” IEEE Trans. Image Process., 8(8):1075–1083 (1999).
C.G. Boncelet, Jr., L.M. Marvel, and C.T. Retter, Spread spectrum image stegangraphy (SSIS). U.S. Patent 6,557,103, 2003.
J. Fridrich and M. Goljan, “Practical steganalysis of digital images—state of the art, in Proceedings of SPIE Electronic Imaging—Photonics West, San Jose, CA, January 2002.
A.K. Jain, Fundamentals of Digital Image Processing (Prentice-Hall, Inc., Englewood Cliffs, NJ, 1989).
W. Bender, W. Butera, D. Gruhl, R. Hwang, F.J. Paiz, and S. Progreb, “Applications for data hiding,” IBM Syst. J. MIT Media Lab., 39(3 & 4) (2000).
P. Wayner, Disappearing Cryptography: Information Hiding—Steganography and Watermarking, (Morgan Kaufmann Publishers, San Francisco, 2002).
M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt, Spread Spectrum Communications, Volume I. (Computer Science Press, Rockville, MD, 1985).
I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking: Principles & Practice (Morgan Kaufmann, San Francisco, 2002).
N.F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures (Kluwer Academic Publishers, Boston, 2001).
E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication (John Wiley and Sons, New York, 2003).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Marvel, L.M. (2005). Information Hiding: Steganography and Watermarking. In: Javidi, B. (eds) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, vol 1. Springer, New York, NY . https://doi.org/10.1007/0-387-25096-4_6
Download citation
DOI: https://doi.org/10.1007/0-387-25096-4_6
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-20616-5
Online ISBN: 978-0-387-25096-0
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)