Skip to main content

Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images

  • Conference paper
  • 894 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

Watermarking techniques can be applied in many applications, such as copyright protection, authentication, fingerprinting, and data hiding. Each different purpose of usability requires different approaches and schemes. In this paper, we present the framework of combining the Advanced Encryption Standard (AES) with watermarking techniques for hiding secret information in digital images. This framework can also be customized for other type of multimedia objects.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Daemen, J., Rijmen, V.: AES Proposal: Rijndael. AES Algorithm Submission (1999)

    Google Scholar 

  2. Duc, D.A., Triet, T.M., Co, L.H.: The extended version of the Rijndael Block Cipher. Journal of Institute of Mathematics and Computer Sciences, India (2001)

    Google Scholar 

  3. Triet, T.M.: Research in Some Issues on Information Security and Applications. MSc Thesis, University of Natural Sciences, VNUHCM, Vietnam (2005)

    Google Scholar 

  4. Duc, D.A., Triet, T.M., Co, L.H.: The extended Rijndael-like Block Ciphers. In: International Conference on Information Technology: Coding and Computing - 2002, The Orleans, Las Vegas, Nevada, USA (2002)

    Google Scholar 

  5. Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Advances in Cryptology (1996)

    Google Scholar 

  6. Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral Dissertation, K.U.Leuven (1995)

    Google Scholar 

  7. Jakobsen, T., Knudsen, L.R.: The interpolation attack on block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  8. Duc, D.A., Triet, T.M., Tuan, D., Lam, H.N.: Watermarking – An overview and applications in Intellectual Property Management and Protection. In: Proc. 3rd Scientific Conference of Hochiminh City University of Natural Sciences, Vietnam (2002)

    Google Scholar 

  9. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, London (2000)

    Google Scholar 

  10. Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing (1998)

    Google Scholar 

  11. Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT domain system for robust image watermrking. Signal (1998)

    Google Scholar 

  12. Meerwarld, P.: Digital Image Watermarking in the Wavelet Transfrom Domain. Salburg (2001)

    Google Scholar 

  13. Zhu, W., Xiong, Z., Zhang, Y.: Multiresolution watermarking for image and video. In: Proc. IEEE Inter. Conf. Image Processing (1998)

    Google Scholar 

  14. Hsu, C., Wu, J.: Hidden signatures in images. In: Proc. IEEE Inter. Conf. Image Processing (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Triet, T.M., Duc, D.A. (2005). Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_89

Download citation

  • DOI: https://doi.org/10.1007/11596981_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics