Advertisement

Reliable Blind Information Hiding for Images

  • Lisa M. Marvel
  • Charles G. BonceletJr
  • Charles T. Retter
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

In this paper we present a new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range. Image processing, error-control coding, and spread spectrum techniques are utilized to conceal hidden data and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, embedded control, and revision tracking.

Keywords

Cover Image Image Watermark Information Hiding Uniform Random Variable Hide Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 1996.Google Scholar
  2. [2]
    M. Bossert and F. Hergert. Hard-and soft-decision decoding beyond the half minimum distance an algorithm for linear codes. IEEE Transactions on Information Theory, 32(5):709–714, Sep 1986.Google Scholar
  3. [3]
    I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-128, NEC Research Institute, Technical Report, August 1995.Google Scholar
  4. [4]
    I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:243–246, September 1996.Google Scholar
  5. [5]
    P. Davern and M. Scott. Fractal based image steganography. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 279–294. Springer-Verlag Berlin, 1996.CrossRefGoogle Scholar
  6. [6]
    F. Hartung and B. Girod. Fast public-key watermarking of compressed video. Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, October 1997.Google Scholar
  7. [7]
    A.K. Jain. Fundamentals of Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs, NJ, 1989.zbMATHGoogle Scholar
  8. [8]
    J.S. Lee. Digital image enhancement and noise filtering by use of local statistics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2:165–168, March 1980.Google Scholar
  9. [9]
  10. [10]
    E. Milbrandt. http://www.members/iquest.net/mrmil/stego.html, October 1997. Steganography Info and Archive.
  11. [11]
    B. Pfitzmann. Information hiding terminology. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 347–350. Springer-Verlag Berlin, 1996.CrossRefGoogle Scholar
  12. [12]
    B. Pfitzmann. Trials of traced traitors. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 49–64. Springer-Verlag Berlin, 1996.CrossRefGoogle Scholar
  13. [13]
    C.I. Podilchuk and W. Zeng. Digital image watermarking using visual models. In B.E. Rogowitz and T.N. Pappas, editors, Human Vision and Electronic Imaging II, volume 3016, pages 100–111. SPIE, Feb 1997.Google Scholar
  14. [14]
    C.T. Retter. Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound. Proceedings of the 1995 IEEE International Symposium on Information Theory, Whistler, British Columbia, page 276, Sep 1995.Google Scholar
  15. [15]
    B. Schneier. Applied Cryptography-Protocols, Algorithms, and Source Code in C. John Wiley and Sons, Inc., New York, NY, 1996.zbMATHGoogle Scholar
  16. [16]
    M.K. Simon, J.K. Omura, R.A. Scholtz, and B. K. Levitt. Spread Sprectrum Communications, Volume I. Computer Science Press, Rockville, Maryland, 1985.Google Scholar
  17. [17]
    J.R. Smith and B.O. Comisky. Modulation and information hiding in images. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 207–226. Springer-Verlag, Berlin, 1996.CrossRefGoogle Scholar
  18. [18]
    M.D. Swanson, B. Zhu, and A.H. Tewfik. Robust data hiding for images. Procedings of the IEEE Digital Signal Processing Workshop, Loen, Norway, pages 37–40, September 1996.Google Scholar
  19. [19]
    M.D. Swanson, B. Zhu, and A.H. Tewfik. Transparent robust image watermarking. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:211–214, September 1996.Google Scholar
  20. [20]
    K. Tanaka, Y. Nakamura, and K. Matsui. Embedding secret information into a dithered multi-level image. Proceedings of the IEEE Military Communications Conference, Monterey, CA, pages 216–220, 1990.Google Scholar
  21. [21]
    R. van Schyndel, A. Tirkel, and C. Osborne. A digital watermark. Proceedings of the IEEE International Conference on Image Processing, 2:86–90, 1994.CrossRefGoogle Scholar
  22. [22]
    R.B. Wolfgang and E.J. Delp. A watermark for digital images. Proceedings of the IEEE International Conference on Image Processing Lausanne, Switzerland III:219–222, September 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Lisa M. Marvel
    • 1
  • Charles G. BonceletJr
    • 2
  • Charles T. Retter
    • 1
  1. 1.U.S. Army Research Laboratory, APGUSA
  2. 2.University of DelawareNewarkUSA

Personalised recommendations