Abstract
Watermarking techniques can be applied in many applications, such as copyright protection, authentication, fingerprinting, and data hiding. Each different purpose of usability requires different approaches and schemes. In this paper, we present the framework of combining the Advanced Encryption Standard (AES) with watermarking techniques for hiding secret information in digital images. This framework can also be customized for other type of multimedia objects.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Daemen, J., Rijmen, V.: AES Proposal: Rijndael. AES Algorithm Submission (1999)
Duc, D.A., Triet, T.M., Co, L.H.: The extended version of the Rijndael Block Cipher. Journal of Institute of Mathematics and Computer Sciences, India (2001)
Triet, T.M.: Research in Some Issues on Information Security and Applications. MSc Thesis, University of Natural Sciences, VNUHCM, Vietnam (2005)
Duc, D.A., Triet, T.M., Co, L.H.: The extended Rijndael-like Block Ciphers. In: International Conference on Information Technology: Coding and Computing - 2002, The Orleans, Las Vegas, Nevada, USA (2002)
Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Advances in Cryptology (1996)
Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral Dissertation, K.U.Leuven (1995)
Jakobsen, T., Knudsen, L.R.: The interpolation attack on block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)
Duc, D.A., Triet, T.M., Tuan, D., Lam, H.N.: Watermarking – An overview and applications in Intellectual Property Management and Protection. In: Proc. 3rd Scientific Conference of Hochiminh City University of Natural Sciences, Vietnam (2002)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, London (2000)
Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing (1998)
Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT domain system for robust image watermrking. Signal (1998)
Meerwarld, P.: Digital Image Watermarking in the Wavelet Transfrom Domain. Salburg (2001)
Zhu, W., Xiong, Z., Zhang, Y.: Multiresolution watermarking for image and video. In: Proc. IEEE Inter. Conf. Image Processing (1998)
Hsu, C., Wu, J.: Hidden signatures in images. In: Proc. IEEE Inter. Conf. Image Processing (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Triet, T.M., Duc, D.A. (2005). Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_89
Download citation
DOI: https://doi.org/10.1007/11596981_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)