Skip to main content

Information Hiding: Steganography and Watermarking

  • Chapter

Part of the book series: Advanced Sciences and Technologies for Security Applications ((ASTSA,volume 1))

Summary

Modern information-hiding techniques conceal the existence of communication. The primary facets of information hiding, also known as data hiding, are payload size, robustness to removal, and imperceptibility of the hidden data. In general, digital techniques can be divided into three classes: invisible watermarking, steganography, and embedded data. However, it is desirable for all classes to successfully conceal the hidden information from applicable detectors. Invisible watermarking, generally employed for copyright protection, traitor tracing, and authentication, forgoes a large payload amount for stringent robustness. Steganography, used for covert communication, pursues increased payload size while sacrificing robustness. Embedding information puts little emphasis on either robustness or covertness. In this chapter, we begin by introducing the motivation for information hiding. Following a brief survey of historic and digital examples, we will delineate the classes of information by describing objectives, applications, and terminology. Detection and attacks for these systems will then be outlined, and three representative techniques will be described in depth. Lastly, concluding remarks and suggestions for further reading will be presented.

A portion of the material presented here appeared in part in the IEEE Transactions on Image Processing, 8(8):1075–1083, August 1999, and at the IEEE 3rd Annual Information Assurance Workshop, West Point, NY, June 2002.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Kerckhoffs, “La cryptographie militaire,” J. Sci. Militaires 9:5–38 (1883).

    Google Scholar 

  2. U.S. Copyright Office, Library of Congress. Digital Millennium Copyright Act of 1998 (DMCA). WWW page, 1998. http://www.loc.gov/copyright/legislation/dmca.pdf.

    Google Scholar 

  3. European Parliament and Council Directive 96/9/EC. WWW page, 1996. http://europa.eu.int/ISPO/infosoc/legreg/docs/969ec.html.

    Google Scholar 

  4. Secure Digital Music Initiative, May 2001. http://www.sdmi.org.

    Google Scholar 

  5. I. Moskowitz, ed., Information Hiding, Fourth International Workshop, Lecture Notes in Computer Science, vol. 2137 (Springer-Verlag, Berlin, 2001).

    Google Scholar 

  6. Status of the paper “Reading between the lines: Lessons from the SDMI challenge.” WWW page, 2001. http://www.cs.princeton.edu/sip/sdmi/.

    Google Scholar 

  7. S.A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, and E.W. Felten, “Reading between the lines: Lessons from the SDMI challenge,” in Proceedings of the 10th USENIX Security Symposium, Washington, DC, August 2001.

    Google Scholar 

  8. D. Kahn, The Codebreakers—The Story of Secret Writing (Scribner, New York, 1967).

    Google Scholar 

  9. B. Pfitzmann, “Trials of traced traitors,” In R. Anderson, ed., Information Hiding, First International Workshop, Lecture Notes in Computer Science, vol. 1174, pages 49–64 (Springer-Verlag, Berlin, 1996).

    Google Scholar 

  10. S. Carver, N. Memon, B. Yeo, and M. Yaeung, “Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications.” IEEE J. Selected Areas Commun. 16:573–586 (1998).

    Article  Google Scholar 

  11. S. Katzenbeisser and F. Petitcolas, eds., Information Hiding: Techniques for Steganography and Digital Watermarking. (Artech House, Inc., Norwood, MA, 2000).

    Google Scholar 

  12. F.A. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Attacks on copyright marking systems,” in D. Aucsmith, ed., Information Hiding, Second International Workshop, Lecture Notes in Computer Science, vol. 1525, pages 219–239 (Springer-Verlag, Berlin, 1998).

    Google Scholar 

  13. F.A. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process., 17(5):58–64 (2000).

    Article  Google Scholar 

  14. S. Pereira, S. Voloshynovskiy, M. Madueo, S. Marchand-Maillet, and T. Pun, “Second generation benchmarking and application oriented evaluation,” in I. Moskowitz, ed., Information Hiding, Fourth International Workshop, Lecture Notes in Computer Science, vol. 2137 (Springer-Verlag, Berlin, 2001).

    Google Scholar 

  15. V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, A. Nikolaidis, and I. Pitas, “A benchmarking protocol for watermarking methods,” in Proceedings of the IEEE International Conference on Image Processing, Thessaloniki, Greece, October 2001.

    Google Scholar 

  16. J. Kelley, “Terror groups hide behind web encryption,” USA Today, June 2001. http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm.

    Google Scholar 

  17. N.F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” IEEE Computer, pages 26–34, February 1998.

    Google Scholar 

  18. J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganography in grayscale and color images,” in Proceedings of the ACM Workshop on Multimedia and Security, pages 27–30, Ottawa, Canada, October 2001.

    Google Scholar 

  19. J. Fridrich, M. Goljan, and R. Du, “Steganalysis based on JPEG compatibility,” in Proceedings of the SPIE Multimedia Systems and Applications IV, Denver, CO, August 2001.

    Google Scholar 

  20. G.S. Lin and W.N. Lie, “A study on detecting image hiding by feature analysis,” in Proceedings of the 2001 IEEE International Symposium on Circuits and Systems, pages 149–152, Sydney, Australia, May 2001.

    Google Scholar 

  21. I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics,” IEEE Trans. Image Process., 12(2):221–229 (2003).

    Article  MathSciNet  Google Scholar 

  22. N. Provos and P. Honeyman, “Detecting steganographic content on the internet,” in Proceedings of the Internet Society’s Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2002.

    Google Scholar 

  23. I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., 6:1673–1687 (1997).

    Article  Google Scholar 

  24. M.J. Jochen, L.M. Marvel, and L.L. Pollock, “MOST: A tamper detection tool for mobile Java software,” in Proceedings of the 3rd Annual Information Assurance Workshop. IEEE, June 2002.

    Google Scholar 

  25. W. Amme, N. Dalton, and J. von Ronne, “SafeTSA: A type safe and referentially secure mobile-code representation based on static single assignment form,” in Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation (PLDI-01) (ACM Press, City, 2001).

    Google Scholar 

  26. Tools Interface Standard Committee. Tools interface standard (TIS) executable and linking format specification, 1993. http://developer.intel.com/vtune/tis.htm.

    Google Scholar 

  27. D.E. Knuth, The Art of Computer Programming: Seminumerical Algorithms, volume 2 (Addison-Wesley, Reading, MA, 1981).

    Google Scholar 

  28. R. Van Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” in Proceedings of the IEEE International Conference on Image Processing, volume 2, pages 86–90, 1994.

    Google Scholar 

  29. R.B. Wolfgang and E.J. Delp, “A watermark for digital images,” in Proceedings of the IEEE International Conference on Image Processing, volume III, pages 219–222, Lausanne, Switzerland, September 1996.

    Google Scholar 

  30. R. Machado, Stego, http://www.stego.com, 2000.

    Google Scholar 

  31. Steganography information and archive. http://www.stegoarchive.com, 2003.

    Google Scholar 

  32. L.M. Marvel, C.G. Boncelet, Jr., and C.T. Retter, “Spread spectrum image steganography,” IEEE Trans. Image Process., 8(8):1075–1083 (1999).

    Article  Google Scholar 

  33. C.G. Boncelet, Jr., L.M. Marvel, and C.T. Retter, Spread spectrum image stegangraphy (SSIS). U.S. Patent 6,557,103, 2003.

    Google Scholar 

  34. J. Fridrich and M. Goljan, “Practical steganalysis of digital images—state of the art, in Proceedings of SPIE Electronic Imaging—Photonics West, San Jose, CA, January 2002.

    Google Scholar 

  35. A.K. Jain, Fundamentals of Digital Image Processing (Prentice-Hall, Inc., Englewood Cliffs, NJ, 1989).

    MATH  Google Scholar 

  36. W. Bender, W. Butera, D. Gruhl, R. Hwang, F.J. Paiz, and S. Progreb, “Applications for data hiding,” IBM Syst. J. MIT Media Lab., 39(3 & 4) (2000).

    Google Scholar 

  37. P. Wayner, Disappearing Cryptography: Information Hiding—Steganography and Watermarking, (Morgan Kaufmann Publishers, San Francisco, 2002).

    Google Scholar 

  38. M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt, Spread Spectrum Communications, Volume I. (Computer Science Press, Rockville, MD, 1985).

    Google Scholar 

  39. I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking: Principles & Practice (Morgan Kaufmann, San Francisco, 2002).

    Google Scholar 

  40. N.F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures (Kluwer Academic Publishers, Boston, 2001).

    Google Scholar 

  41. E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication (John Wiley and Sons, New York, 2003).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Marvel, L.M. (2005). Information Hiding: Steganography and Watermarking. In: Javidi, B. (eds) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, vol 1. Springer, New York, NY . https://doi.org/10.1007/0-387-25096-4_6

Download citation

Publish with us

Policies and ethics