skip to main content
10.1145/357744.357904acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article
Free Access

Secure high data embedding rate for steganographic application

Authors Info & Claims
Published:04 November 2000Publication History

ABSTRACT

Data hiding is the process of secretly embedding information inside a data source without changing its perceptual quality or its statistical properties. In this paper we present a new data hiding technique for embedding a high data rate in the transform domain. This technique is suitable for applications such as covert communication and captioning. The technique is based on increasing the number of image transform coefficients used to carry the information by decorrelating the image samples in the spatial domain. The embedding technique does not introduce noticeable changes neither in the perceptual quality nor in the statistical properties of the cover image. Hence, it is considered to be secure.

References

  1. 1.M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data embedding and watermarking technologies," Proc. IEEE, vol. 86, no. 6, pp. 1064-1087, Jun. 1998.]]Google ScholarGoogle ScholarCross RefCross Ref
  2. 2.W. Bender, D. Grnhl, and N. Morimoto, "Techniques for data hiding," Proc. SPIE, Stor. Retr. Imag. Vid. Dat. III, vol. 2420, pp. 40-50, Feb. 1995.]]Google ScholarGoogle Scholar
  3. 3.J. Fridrich, "A New Steganographic Method for Pallete-based Images," Proc. ISET PICS Conf., pp. 285-289, GA, Apr. 1998.]]Google ScholarGoogle Scholar
  4. 4.J. R. Smith and B. O. Comisky, "Modulation and information hiding in images," in Information hiding workshop, Leer. Notes Comp. Se., Germany, 1996, vol. 1174, pp. 207-226, Springer-Verlag.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.D. Aucsmith, Information Hiding: Second International Workshop, Lect. Notes Comp. Sc., Springer-Verlag, Berlin, Portland, Oregon, U.S.A, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.R. Anderson and F. Petitcolas, "On the Limits of Steganography," IEEE J Sel Areas Comm, vol. 16, no. 4, pp. 474-481, May 1998.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.S. Katzenbeisser and F. A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Mass., U. S. A, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.A. Jain, Fundamentals Of Digital Image Processing, Prentice Hall, Englewood Cliffs, NJ, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.A. Papoulis, Probability, Random Variables, and Stochastic Processes, McGraw-Hill, New York, 1991.]]Google ScholarGoogle Scholar
  10. 10.S. Haykin, Communication Systems, John Wiley & Sons, New York, U. S. A, 1994.]]Google ScholarGoogle Scholar
  11. 11.T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley & Sons, New York, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.C. Cachin, "An information theoretic model for steganography," in (Auesmith, eds) Information Hiding: Second International Workshop, Lect. Notes Comp. Sc., pp. 218-238, Jan 1998.]]Google ScholarGoogle Scholar

Index Terms

  1. Secure high data embedding rate for steganographic application

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  MULTIMEDIA '00: Proceedings of the 2000 ACM workshops on Multimedia
                  November 2000
                  248 pages
                  ISBN:1581133111
                  DOI:10.1145/357744

                  Copyright © 2000 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 4 November 2000

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate995of4,171submissions,24%

                  Upcoming Conference

                  MM '24
                  MM '24: The 32nd ACM International Conference on Multimedia
                  October 28 - November 1, 2024
                  Melbourne , VIC , Australia
                • Article Metrics

                  • Downloads (Last 12 months)7
                  • Downloads (Last 6 weeks)0

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader