Reliable Blind Information Hiding for Images

In this paper we present a new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range. Image processing, error-control coding, and spread spectrum techniques are utilized to conceal hidden data and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, embedded control, and revision tracking.

[1]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[2]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[3]  Martin Bossert,et al.  Hard- and soft-decision decoding beyond the half minimum distance---An algorithm for linear codes , 1986, IEEE Trans. Inf. Theory.

[4]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[5]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[6]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[7]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[8]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[9]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  C. T. Retter Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[12]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[14]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[15]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[16]  Jong-Sen Lee,et al.  Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[18]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[19]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.