Information hiding-a survey

Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

[1]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[2]  Peter Wayner Disappearing cryptography - being and nothingness on the net , 1996 .

[3]  Sijbrand Spannenburg Optically and machine-detectable copying security elements , 1996, Electronic Imaging.

[4]  Dieter Gollmann,et al.  Computer Security — ESORICS 98 , 1998, Lecture Notes in Computer Science.

[5]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[6]  A. W. M. van den Enden,et al.  Discrete Time Signal Processing , 1989 .

[7]  A.,et al.  The Origins of Spread-Spectrum Communications , 2000 .

[8]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[9]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[10]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[11]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[12]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[13]  D. E. Pearson,et al.  Frequency mode LR attack operator for digitally watermarked images , 1998 .

[14]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[15]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[16]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[17]  Christophe De Vleeschouwer,et al.  Watermarking algorithm based on a human visual model , 1998, Signal Process..

[18]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[19]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.

[20]  Jean-Luc Dugelay,et al.  Image watermarking based on the fractal transform: a draft demonstration , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[21]  Ralf Steinmetz,et al.  Multimedia and Security Workshop at ACM Multimedia , 1998 .

[22]  Virgil D. Gligor,et al.  A guide to understanding covert channel analysis of trusted systems , 1993 .

[23]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[24]  D. Schilling Meteor burst communications : theory and practice , 1993 .

[25]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[26]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[27]  John P. Oakley,et al.  Storage and Retrieval for Image and Video Databases , 1993 .

[28]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[29]  L Rudolf,et al.  Optical Security and Counterfeit Deterrence Techniques III , 1996 .

[30]  David Whitehead,et al.  How to survive under siege , 1990 .

[31]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[32]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[33]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[34]  Serge Vaudenay,et al.  The Newton Channel , 1996, Information Hiding.

[35]  Boon-Lock Yeo,et al.  Technical trials and legal tribulations , 1998, CACM.

[36]  Guy William Willis Stevens,et al.  Microphotography: Photography and Photofabrication at Extreme Resolution , 1968 .

[37]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[38]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[39]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[40]  Richard C. Benson,et al.  Technology approaches to currency security , 1998, Electronic Imaging.

[41]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[42]  Ennio Ottaviani,et al.  Non-invertible statistical wavelet watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[43]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[44]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[45]  R. A. Willard,et al.  ICE (Identification Coding, Embedded) , 1993 .

[46]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[47]  Ting Chen,et al.  Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[48]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[49]  Awj Werner Oomen,et al.  A Variable-Bit-Rate Buried-Data Channel for Compact Disc , 1995 .

[50]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[51]  Michael G. Strintzis,et al.  Robust image watermarking in the subband or discrete cosine transform domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[52]  Jean-Paul M. G. Linnartz The "Ticket" Concept for Copy Control Based on Embedded Signalling , 1998, ESORICS.

[53]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[54]  Jim Reeds Solved: the Ciphers in Book III of Trithemius's Steganographia , 1998, Cryptologia.

[55]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video : Identification and protection of multimedia information , 1999 .

[56]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[57]  Gustavus J. Simmons,et al.  Subliminal channels; past and present , 2010, Eur. Trans. Telecommun..

[58]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[59]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[60]  R. L. Fountain,et al.  The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[61]  I.J. Cox,et al.  Watermarking in the real world: an application to DVD , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[62]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[63]  Rudolf L. van Renesse Security design of valuable documents and products , 1996 .

[64]  B. Moore An introduction to the psychology of hearing (5th ed.). , 1989 .

[65]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[66]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[67]  Neil A. Dodgson,et al.  Quadratic interpolation for image resampling , 1997, IEEE Trans. Image Process..

[68]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[69]  J. Wilkins Mercury or The Secret and Swift Messenger , 1984 .

[70]  Ross J. Anderson Liability and Computer Security: Nine Principles , 1994, ESORICS.

[71]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[72]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[73]  Dick van Lingen The new Dutch passport , 1996 .

[74]  D. Brewster,et al.  On microscopic vision and a new form of microscope , 1860 .

[75]  Gustavus J. Simmons,et al.  The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..

[76]  Ian M. Lancaster,et al.  Progress in counterfeit deterrence: the contribution of information exchange , 1996, Electronic Imaging.

[77]  Bernice E. Rogowitz,et al.  Human Vision and Electronic Imaging II , 1997 .

[78]  Bernard Newman,et al.  Secrets of German espionage , 1940 .

[79]  E. Owens Introduction to the Psychology of Hearing , 1977 .

[80]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[81]  Jurgis Baltrušaitis,et al.  Anamorphoses ou thaumaturgus opticus , 1984 .

[82]  van EckWim Electromagnetic radiation from video display units: an eavesdropping risk? , 1985 .

[83]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[84]  Bo Rudin,et al.  Making Paper: A Look into the History of an Ancient Craft , 1990 .

[85]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[86]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[87]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[88]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[89]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[90]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[91]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[92]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[93]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[94]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[95]  Josh Benaloh Verifiable secret-ballot elections , 1987 .

[96]  B. P. Bogert,et al.  The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .

[97]  Eli Biham Fast software encryption : 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997 : proceedings , 1997, FSE 1997.

[98]  R. Schafer Echo removal by discrete generalized linear filtering. , 1969 .

[99]  Ross J. Anderson Why cryptosystems fail , 1994, CACM.

[100]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[101]  Gaston Tissandier,et al.  Les Merveilles de la photographie , 2022 .

[102]  Rudolf L. van Renesse,et al.  Verifying versus falsifying banknotes , 1998 .

[103]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[104]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[105]  Jessica J. Fridrich,et al.  Comparing robustness of watermarking techniques , 1999, Electronic Imaging.

[106]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[107]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[108]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[109]  Gustavus J. Simmons,et al.  Results concerning the bandwidth of subliminal channels , 1998, IEEE J. Sel. Areas Commun..

[110]  J. D. Brongers Search for effective document security by inventioneering , 1998, Electronic Imaging.

[111]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[112]  Bernd Girod,et al.  Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.

[113]  Friedrich L. Bauer,et al.  Decrypted secrets - methods and maxims of cryptology , 1997 .

[114]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[115]  Walter Bender,et al.  Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.

[116]  Gordon W. Braudaway,et al.  Results of attacks on a claimed robust digital image watermark , 1998, Electronic Imaging.

[117]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[118]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[119]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[120]  Markus G. Kuhn,et al.  Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.

[121]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.