Methodology of Spread-Spectrum Image Steganography

Abstract : This report presents a new method of digital steganography, entitled Spread-Spectrum Image Steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a brief history of this art and a discussion of steganographic communication theory, the new method, SSIS, is introduced. This system hides and recovers messages of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden messages can be recovered using appropriate keys without any knowledge of the original image. Image processing, error control coding, and spread-spectrum techniques utilized are described, and the performance of the technique is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

[1]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[2]  Jong-Sen Lee,et al.  Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[5]  Martin Bossert,et al.  Hard- and soft-decision decoding beyond the half minimum distance---An algorithm for linear codes , 1986, IEEE Trans. Inf. Theory.

[6]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[7]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[8]  Alexander A. Sawchuk,et al.  Adaptive Noise Smoothing Filter for Images with Signal-Dependent Noise , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  C. T. Retter Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[12]  Jorge Herbert de Lira,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[13]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[14]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[15]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[16]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[17]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.