Abstract
In this paper we present a new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range. Image processing, error-control coding, and spread spectrum techniques are utilized to conceal hidden data and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, embedded control, and revision tracking.
Prepared through collaborative participation in the Advanced Telecommunication/Information Distribution Research Program (ATIRP) Consortium sponsored by the U.S. Army Research Laboratory under Cooperative Agreement DAAL01-96-2-002.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 1996.
M. Bossert and F. Hergert. Hard-and soft-decision decoding beyond the half minimum distance an algorithm for linear codes. IEEE Transactions on Information Theory, 32(5):709–714, Sep 1986.
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-128, NEC Research Institute, Technical Report, August 1995.
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:243–246, September 1996.
P. Davern and M. Scott. Fractal based image steganography. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 279–294. Springer-Verlag Berlin, 1996.
F. Hartung and B. Girod. Fast public-key watermarking of compressed video. Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, October 1997.
A.K. Jain. Fundamentals of Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs, NJ, 1989.
J.S. Lee. Digital image enhancement and noise filtering by use of local statistics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2:165–168, March 1980.
R. Machado. Stego, 1997. http://www.fqa.com/romana/romanasoft/stego.html.
E. Milbrandt. http://www.members/iquest.net/mrmil/stego.html, October 1997. Steganography Info and Archive.
B. Pfitzmann. Information hiding terminology. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 347–350. Springer-Verlag Berlin, 1996.
B. Pfitzmann. Trials of traced traitors. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 49–64. Springer-Verlag Berlin, 1996.
C.I. Podilchuk and W. Zeng. Digital image watermarking using visual models. In B.E. Rogowitz and T.N. Pappas, editors, Human Vision and Electronic Imaging II, volume 3016, pages 100–111. SPIE, Feb 1997.
C.T. Retter. Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound. Proceedings of the 1995 IEEE International Symposium on Information Theory, Whistler, British Columbia, page 276, Sep 1995.
B. Schneier. Applied Cryptography-Protocols, Algorithms, and Source Code in C. John Wiley and Sons, Inc., New York, NY, 1996.
M.K. Simon, J.K. Omura, R.A. Scholtz, and B. K. Levitt. Spread Sprectrum Communications, Volume I. Computer Science Press, Rockville, Maryland, 1985.
J.R. Smith and B.O. Comisky. Modulation and information hiding in images. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 207–226. Springer-Verlag, Berlin, 1996.
M.D. Swanson, B. Zhu, and A.H. Tewfik. Robust data hiding for images. Procedings of the IEEE Digital Signal Processing Workshop, Loen, Norway, pages 37–40, September 1996.
M.D. Swanson, B. Zhu, and A.H. Tewfik. Transparent robust image watermarking. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:211–214, September 1996.
K. Tanaka, Y. Nakamura, and K. Matsui. Embedding secret information into a dithered multi-level image. Proceedings of the IEEE Military Communications Conference, Monterey, CA, pages 216–220, 1990.
R. van Schyndel, A. Tirkel, and C. Osborne. A digital watermark. Proceedings of the IEEE International Conference on Image Processing, 2:86–90, 1994.
R.B. Wolfgang and E.J. Delp. A watermark for digital images. Proceedings of the IEEE International Conference on Image Processing Lausanne, Switzerland III:219–222, September 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Marvel, L.M., Boncelet, C.G., Retter, C.T. (1998). Reliable Blind Information Hiding for Images. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_4
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive