Digital Watermarking and Steganography

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

[1]  F. MacWilliams,et al.  Pseudo-random sequences and arrays , 1976, Proceedings of the IEEE.

[2]  Dogan Kesdogan,et al.  Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.

[3]  Benoit M. Macq,et al.  Robust watermarking based on the warping of predefined triangular patterns , 2000, Electronic Imaging.

[4]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[5]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[6]  Ton Kalker,et al.  Adaptive quantization watermarking , 2004, IS&T/SPIE Electronic Imaging.

[7]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[8]  Cornelius W. A. M. van Overveld,et al.  Digital watermarking by geometric warping , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[9]  Jessica J. Fridrich,et al.  Efficient Wet Paper Codes , 2005, Information Hiding.

[10]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[11]  Richard D. Gitlin,et al.  Data Communications Principles , 2012 .

[12]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[13]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[14]  Yvo Desmedt,et al.  SUBLIMINAL-FREE AUTHENTICATION AND SIGNATURE , 1988 .

[15]  Jeffrey A. Bloom,et al.  Computing the Probability of False Watermark Detection , 1999, Information Hiding.

[16]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[17]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[18]  Michael Backes,et al.  Public-Key Steganography with Active Attacks , 2005, TCC.

[19]  Mark Ettinger,et al.  Steganalysis and Game Equilibria , 1998, Information Hiding.

[20]  Hideki Noda,et al.  Application of QIM with dead zone for histogram preserving JPEG steganography , 2005, IEEE International Conference on Image Processing 2005.

[21]  A. E. Bell The dynamic digital disk , 1999 .

[22]  Ingemar J. Cox,et al.  Trellis coded modulation to improve dirty paper trellis watermarking , 2007, Electronic Imaging.

[23]  Gottfried Ungerboeck,et al.  Channel coding with multilevel/phase signals , 1982, IEEE Trans. Inf. Theory.

[24]  Deepa Kundur,et al.  Blind image deconvolution , 1996, IEEE Signal Process. Mag..

[25]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[26]  Arno J. van Leest,et al.  High capacity reversible watermarking for audio , 2003, IS&T/SPIE Electronic Imaging.

[27]  B. S. Manjunath,et al.  Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.

[28]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[29]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[30]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[31]  Josep Vidal,et al.  Optimum watermark detection in color images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[32]  Min Wu,et al.  Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[33]  Shih-Kun Huang,et al.  Cocktail Watermarking on Images , 1999, Information Hiding.

[34]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[35]  Feng Lin,et al.  Towards absolute invariants of images under translation, rotation, and dilation , 1993, Pattern Recognit. Lett..

[36]  Shen-Ge Wang,et al.  Embedding digital watermarks in halftone screens , 2000, Electronic Imaging.

[37]  Adnan M. Alattar,et al.  Reversible watermark using difference expansion of quads , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[38]  Chengyun Yang,et al.  Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets , 2006, IWDW.

[39]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System , 2002, ISMIR.

[40]  C. Helstrom,et al.  Statistical theory of signal detection , 1968 .

[41]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[42]  Carl-Erik W. Sundberg,et al.  Digital audio broadcasting in the FM band by means of contiguous band insertion and precanceling techniques , 2000, IEEE Trans. Commun..

[43]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[44]  Teddy Furon,et al.  A theoretical study of watermarking security , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[45]  L. Schuchman Dither Signals and Their Effect on Quantization Noise , 1964 .

[46]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[47]  Peter Wayner,et al.  Mimic Functions , 1992, Cryptologia.

[48]  Shih-Fu Chang,et al.  Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .

[49]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[50]  K A Birney,et al.  On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..

[51]  Jean Laroche,et al.  Improved phase vocoder time-scale modification of audio , 1999, IEEE Trans. Speech Audio Process..

[52]  Hideyoshi Tominaga,et al.  A proposal on digital watermark in document image communication and its application to realizing a signature , 1990 .

[53]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[54]  Hiroshi Masuda,et al.  Watermarking three-dimensional polygonal models through geometric and topological modifications , 1998, IEEE J. Sel. Areas Commun..

[55]  Klara Nahrstedt,et al.  Noninvertible watermarking methods for MPEG-encoded audio , 1998, Electronic Imaging.

[56]  John D. Villasenor,et al.  Visual thresholds for wavelet quantization error , 1996, Electronic Imaging.

[57]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[58]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[59]  Miodrag Potkonjak,et al.  Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.

[60]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[61]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[62]  Mark Dolson,et al.  The Phase Vocoder: A Tutorial , 1986 .

[63]  Christophe De Vleeschouwer,et al.  Watermarking algorithm based on a human visual model , 1998, Signal Process..

[64]  Jessica J. Fridrich,et al.  Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.

[65]  H H Arsenault,et al.  Rotation-invariant digital pattern recognition using circular harmonic expansion. , 1982, Applied optics.

[66]  Andrew Z. Tirkel,et al.  Image and watermark registration , 1998, Signal Process..

[67]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[68]  Jean-Paul M. G. Linnartz,et al.  MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video , 1998, ESORICS.

[69]  Bin Zhu,et al.  Media compression via data hiding , 1997, Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36136).

[70]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[71]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[72]  C. Britton Rorabaugh Error Coding Cookbook: Practical C/C++ Routines and Recipes for Error Detection and Correction , 1996 .

[73]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[74]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[75]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[76]  Mikhail J. Atallah,et al.  A hierarchical protocol for increasing the stealthiness of steganographic methods , 2004, MM&Sec '04.

[77]  Abbas El Gamal,et al.  On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.

[78]  Alain Glavieux,et al.  Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .

[79]  Ingemar J. Cox,et al.  Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.

[80]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[81]  Glenn Healey,et al.  Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[82]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[83]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[84]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[85]  Jeffrey B. Lotspiech,et al.  Safeguarding Digital Library Contents and Users: Digital Watermarking , 1997, D Lib Mag..

[86]  R. D. Gibson Theory and problems of heat transfer, (schaum's outline series): McGraw-Hill, New York (1978) , 1979 .

[87]  Sorina Dumitrescu,et al.  LSB steganalysis based on high-order statistics , 2005, MM&Sec '05.

[88]  D. Hatzinakos,et al.  Semi-blind image restoration based on telltale watermarking , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).

[89]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[90]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[91]  J. Chou,et al.  On the duality between distributed source coding and data hiding , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[92]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[93]  Imants D. Svalbe,et al.  Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[94]  Ingemar J. Cox,et al.  Information Transmission and Steganography , 2005, IWDW.

[95]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[96]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[97]  Juergen Bierbrauer Introduction to coding theory , 2005, Discrete mathematics and its applications.

[98]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[99]  William Bialek,et al.  Statistics of Natural Images: Scaling in the Woods , 1993, NIPS.

[100]  Jr. Thomas G. Stockham,et al.  Image processing in the context of a visual model , 1972 .

[101]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[102]  Ernest L. Hall,et al.  A Nonlinear Model for the Spatial Characteristics of the Human Visual System , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[103]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[104]  Ting Chen,et al.  Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[105]  Jaap A. Haitsma,et al.  Robust Audio Hashing for Content Identification , 2001 .

[106]  Gernot Kubin,et al.  Speech watermarking for air traffic control , 2004, 2004 12th European Signal Processing Conference.

[107]  Gábor Tardos,et al.  Optimal probabilistic fingerprint codes , 2003, STOC '03.

[108]  Boon-Lock Yeo,et al.  Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.

[109]  Fernando Pérez-González,et al.  Trellis-Coded Rational Dither Modulation for Digital Watermarking , 2005, IWDW.

[110]  T. Furon,et al.  Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[111]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[112]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[113]  A. Spanias,et al.  Perceptual coding of digital audio , 2000, Proceedings of the IEEE.

[114]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[115]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[116]  Tao Zhang,et al.  A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..

[117]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[118]  Ton Kalker,et al.  The VIVA project: digital watermarking for broadcast monitoring , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[119]  R.L. Lagendijk,et al.  Amplitude Scale Estimation for Quantization-Based Watermarking , 2006, IEEE Transactions on Signal Processing.

[120]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[121]  Norka B. Lucena,et al.  Syntax and Semantics-Preserving Application-Layer Protocol Steganography , 2004, Information Hiding.

[122]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[123]  Mahalingam Ramkumar Data hiding in multimedia - theory and applications , 1999 .

[124]  Ioannis Pitas,et al.  Watermarking polygonal lines using Fourier descriptors , 2000, IEEE Computer Graphics and Applications.

[125]  Andrew D. Ker Resampling and the detection of LSB matching in color bitmaps , 2005, IS&T/SPIE Electronic Imaging.

[126]  Allan Borodin,et al.  Lower bounds for high dimensional nearest neighbor search and related problems , 1999, STOC '99.

[127]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[128]  Jean-Luc Dugelay,et al.  Possible counter-attacks against random geometric distortions , 2000, Electronic Imaging.

[129]  D. M. Green,et al.  Signal detection theory and psychophysics , 1966 .

[130]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[131]  Ilkka Tuomi Inventing the Web , 2006 .

[132]  H. Arsenault,et al.  Experiments on pattern recognition using invariant Fourier-Mellin descriptors. , 1986, Journal of the Optical Society of America. A, Optics and image science.

[133]  Kannan Ramchandran,et al.  Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.

[134]  Cheng Yang,et al.  Music Database Retrieval Based on Spectral Similarity , 2001 .

[135]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[136]  Ronen Basri,et al.  Recognition by Linear Combinations of Models , 1991, IEEE Trans. Pattern Anal. Mach. Intell..

[137]  Thierry Pun,et al.  Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..

[138]  John Stach,et al.  A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform , 2004, IS&T/SPIE Electronic Imaging.

[139]  Eero P. Simoncelli Statistical models for images: compression, restoration and synthesis , 1997, Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36136).

[140]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[141]  En-Hui Yang,et al.  On Information Embedding When Watermarks and Covertexts Are Correlated , 2006, ISIT.

[142]  Jean-François Delaigle,et al.  Improving data hiding by using convolutional codes and soft-decision decoding , 2000, Electronic Imaging.

[143]  F. Harris On the use of windows for harmonic analysis with the discrete Fourier transform , 1978, Proceedings of the IEEE.

[144]  H.-J. Braun,et al.  Advanced weaponry of the Stars , 1997 .

[145]  Takeo Kanade,et al.  An Iterative Image Registration Technique with an Application to Stereo Vision , 1981, IJCAI.

[146]  Bernd Girod,et al.  Quantization effects on digital watermarks , 2001, Signal Process..

[147]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[148]  Ahmed H. Tewfik,et al.  Geometric distortion correction through image normalization , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[149]  Ralf Steinmetz,et al.  New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP) , 2000, Electronic Imaging.

[150]  Andrew D. Ker Quantitative evaluation of pairs and RS steganalysis , 2004, IS&T/SPIE Electronic Imaging.

[151]  Thierry Pun,et al.  Secure robust digital watermarking using the lapped orthogonal transform , 1999, Electronic Imaging.

[152]  Heidi A. Peterson,et al.  Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.

[153]  Jaejin Lee,et al.  Image integrity and correction using parities of error control coding , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[154]  William A. Pearlman,et al.  Capacity of Steganographic Channels , 2005, IEEE Transactions on Information Theory.

[155]  Martin Kutter Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation , 1999, Information Hiding.

[156]  Gregory W. Wornell,et al.  Preprocessed and postprocessed quantization index modulation methods for digital watermarking , 2000, Electronic Imaging.

[157]  Jean-Jacques Quisquater,et al.  Robust Object Watermarking: Application to Code , 1999, Information Hiding.

[158]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[159]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[160]  Anastasios Tefas,et al.  Multi-bit image watermarking robust to geometric distortions , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[161]  Aníbal J. S. Ferreira An odd-DFT based approach to time-scale expansion of audio signals , 1999, IEEE Trans. Speech Audio Process..

[162]  Guy William Willis Stevens,et al.  Microphotography: Photography and Photofabrication at Extreme Resolution , 1968 .

[163]  D J Field,et al.  Relations between the statistics of natural images and the response properties of cortical cells. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[164]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[165]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.

[166]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[167]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[168]  S. Decker Engineering considerations in commercial watermarking , 2001 .

[169]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[170]  Andrew D. Ker Optimally weighted least-squares steganalysis , 2007, Electronic Imaging.

[171]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[172]  Tina Lindkvist,et al.  Fingerprinting of digital documents , 1999 .

[173]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[174]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[175]  Pierre Moulin,et al.  New results on steganographic capacity , 2004 .

[176]  Hirofumi Muratani A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience , 2001, Information Hiding.

[177]  Helmut Neuschmied,et al.  Content-based identification of audio titles on the Internet , 2001, Proceedings First International Conference on WEB Delivering of Music. WEDELMUSIC 2001.

[178]  Michael T. Orchard,et al.  Geometric properties of watermarking schemes , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[179]  Sushil Jajodia,et al.  Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.

[180]  Bernard Chazelle,et al.  A lower bound on the complexity of approximate nearest-neighbor searching on the Hamming cube , 1999, STOC '99.

[181]  Joyce E. Farrell,et al.  Perceptual quality metric for digitally coded color images , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[182]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[183]  T. Tan,et al.  On estimation of secret message length in JSteg-like steganography , 2004, ICPR 2004.

[184]  Ingemar J. Cox,et al.  Audio Fingerprinting: Nearest Neighbor Search in High Dimensional Binary Spaces , 2005, J. VLSI Signal Process..

[185]  Shih-Fu Chang,et al.  Embedding visible video watermarks in the compressed domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[186]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[187]  G. Kubin,et al.  Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication , 2003, Digital Avionics Systems Conference, 2003. DASC '03. The 22nd.

[188]  R. Bracewell The Fourier Transform and Its Applications , 1966 .

[189]  Jang-Ping Sheu,et al.  Mean quantization blind watermarking for image authentication , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[190]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[191]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[192]  Jean-Luc Dugelay,et al.  Blind detection of malicious alterations on still images using robust watermarks , 2000 .

[193]  D. Casasent,et al.  Position, rotation, and scale invariant optical correlation. , 1976, Applied optics.

[194]  Lawrence O'Gorman,et al.  Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..

[195]  Bernd Girod,et al.  Watermark Detection after Quanization Attacks , 1999, Information Hiding.

[196]  Harold S. Stone,et al.  Progressive wavelet correlation using Fourier methods , 1999, IEEE Trans. Signal Process..

[197]  Khalid Sayood,et al.  Introduction to Data Compression , 1996 .

[198]  Takehiro Moriya,et al.  Digital watermarking schemes based on vector quantization , 1997, 1997 IEEE Workshop on Speech Coding for Telecommunications Proceedings. Back to Basics: Attacking Fundamental Problems in Speech Coding.

[199]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[200]  Ricardo A. Garcia,et al.  Digital Watermarking of Audio Signals Using a Psychoacoustic Auditory Model and Spread Spectrum Theory , 1999 .

[201]  Xiangyang Luo,et al.  An Improved Sample Pairs Method for Detection of LSB Embedding , 2004, Information Hiding.

[202]  J. Le Moigne,et al.  Towards a parallel registration of multiple resolution remote sensing data , 1995 .

[203]  Julien P. Stern,et al.  An Analysis of One of the SDMI Candidates , 2001, Information Hiding.

[204]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[205]  Scott J. Daly,et al.  Visible differences predictor: an algorithm for the assessment of image fidelity , 1992, Electronic Imaging.

[206]  F. Campbell,et al.  The effect of orientation on the visual resolution of gratings , 1966, The Journal of physiology.

[207]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[208]  Gustavus J. Simmons,et al.  The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..

[209]  Jessica J. Fridrich,et al.  On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.

[210]  Fernando Pérez-González,et al.  Statistical analysis of watermarking schemes for copyright protection of images , 1999, Proc. IEEE.

[211]  Miodrag Potkonjak,et al.  Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[212]  Maxim Sidorov,et al.  Hidden Markov models and steganalysis , 2004, MM&Sec '04.

[213]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[214]  Ton Kalker,et al.  Analysis of watermark detection using SPOMF , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[215]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[216]  Rainer Böhme,et al.  A two-factor error model for quantitative steganalysis , 2006, Electronic Imaging.

[217]  C.-C. Jay Kuo,et al.  Robust and efficient digital audio watermarking using audio content analysis , 2000, Electronic Imaging.

[218]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[219]  Henk J. A. M. Heijmans,et al.  Reversible Data Embedding Based on the Haar Wavelet Decomposition , 2003, DICTA.

[220]  F. Muller Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .

[221]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[222]  Jan Biemond,et al.  Image and Video Databases: Restoration, Watermarking and Retrieval , 2000 .

[223]  Changsheng Xu,et al.  Audio registration and its application in digital watermarking , 2000, Electronic Imaging.

[224]  Oliver Benedens,et al.  Geometry-Based Watermarking of 3D Models , 1999, IEEE Computer Graphics and Applications.

[225]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[226]  D. Jacobs Grouping for Recognition , 1989 .

[227]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[228]  Ernst Terhardt,et al.  Calculating virtual pitch , 1979, Hearing Research.

[229]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[230]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[231]  Henry M. Gladney,et al.  Safeguarding Digital Library Contents and Users: Digital Images of Treasured Antiquities , 1997, D Lib Mag..

[232]  Paul A. Viola,et al.  Alignment by Maximization of Mutual Information , 1997, International Journal of Computer Vision.

[233]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[234]  Nicholas Hopper,et al.  Public-Key Steganography , 2003, EUROCRYPT.

[235]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[236]  Kyung-Ae Moon,et al.  EM Estimation of Scale Factor for Quantization-Based Audio Watermarking , 2003, IWDW.

[237]  Bernd Girod,et al.  On the robustness and imperceptibility of digital fingerprints , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[238]  Thierry Pun,et al.  Effective channel coding for DCT watermarks , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[239]  Marten van Dijk,et al.  Embedding Information in Grayscale Images , 2001 .

[240]  Jeffrey J. Rodríguez,et al.  Robust watermarking using robust coefficients , 2000, Electronic Imaging.

[241]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[242]  Arno J. van Leest,et al.  Reversible watermarking for images , 2004, IS&T/SPIE Electronic Imaging.

[243]  Franck Davoine,et al.  Geometrical and frequential watermarking scheme using similarities , 1999, Electronic Imaging.

[244]  Benoit M. Macq,et al.  Generalized 2-D cyclic patterns for secret watermark generation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[245]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[246]  Sushil K. Bhattacharjee,et al.  Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[247]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.

[248]  Ying Wang,et al.  Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.

[249]  B. Widrow Statistical analysis of amplitude-quantized sampled-data systems , 1961, Transactions of the American Institute of Electrical Engineers, Part II: Applications and Industry.

[250]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[251]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[252]  Chris Honsinger Data Embedding Using Phase Dispersion , 2000, PICS.

[253]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[254]  Warren D. Smith Studies in computational geometry motivated by mesh generation , 1989 .

[255]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[256]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[257]  Steven H. Low,et al.  Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..

[258]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[259]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[260]  N. Wiberg,et al.  Random codes for digital fingerprinting , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[261]  Ernest Hatch Wilkins A History of Italian Literature , 1954 .

[262]  Sorina Dumitrescu,et al.  Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.

[263]  F. Campbell,et al.  Orientational selectivity of the human visual system , 1966, The Journal of physiology.

[264]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[265]  Ingemar J. Cox,et al.  Watermarking Is Not Cryptography , 2006, IWDW.

[266]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[267]  Lisa M. Brown,et al.  A survey of image registration techniques , 1992, CSUR.

[268]  Ira S. Moskowitz,et al.  An Entropy-Based Framework for Database Inference , 1999, Information Hiding.

[269]  J Duvernoy,et al.  Circular-Fourier-radial-Mellin transform descriptors for pattern recognition. , 1986, Journal of the Optical Society of America. A, Optics and image science.

[270]  Gabriela Csurka,et al.  A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking , 1999, Information Hiding.

[271]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[272]  Daniel Augot,et al.  Secure delivery of images over open networks , 1999 .

[273]  Qiao Li,et al.  Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[274]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[275]  N. J. A. Sloane,et al.  Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.

[276]  André Kaup,et al.  Steganographic system based on higher-order statistics , 2003, IS&T/SPIE Electronic Imaging.

[277]  D. Storck,et al.  A New Approach to Integrity of Digital Images , 1996, IFIP World Conference on Mobile Communications.

[278]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[279]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[280]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[281]  Imants D. Svalbe,et al.  Algebraic construction of a new class of quasi-orthogonal arrays for steganography , 1999, Electronic Imaging.

[282]  Regunathan Radhakrishnan,et al.  Data Masking: A New Approach for Steganography? , 2005, J. VLSI Signal Process..

[283]  M. M. Taylor,et al.  Visual discrimination and orientation. , 1963, Journal of the Optical Society of America.

[284]  Aggelos Kiayias,et al.  Efficient Steganography with Provable Security Guarantees , 2005, Information Hiding.

[285]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[286]  M. Barni,et al.  Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.

[287]  Bernd Girod,et al.  Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[288]  Claude E. Shannon,et al.  Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..

[289]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[290]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[291]  Ton Kalker,et al.  Feature Extraction and a Database Strategy for Video Fingerprinting , 2002, VISUAL.

[292]  Sidney C. Port,et al.  Probability, Random Variables, and Stochastic Processes—Second Edition (Athanasios Papoulis) , 1986 .

[293]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[294]  Ton Kalker,et al.  Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.

[295]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[296]  H. C. Papadopoulos,et al.  Simultaneous broadcasting of analog FM and digital audio signals by means of precanceling techniques , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[297]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[298]  Martin J. Wainwright,et al.  Scale Mixtures of Gaussians and the Statistics of Natural Images , 1999, NIPS.

[299]  Jerry D. Gibson,et al.  Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..

[300]  Peter M. J. Rongen,et al.  Digital image watermarking by salient point modification: practical results , 1999, Electronic Imaging.

[301]  D. H. Kelly Visual response to time-dependent stimuli. I. Amplitude sensitivity measurements. , 1961, Journal of the Optical Society of America.

[302]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[303]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[304]  Horst Hering,et al.  Digital signatures for the analogue radio , 2005 .

[305]  Oscar C. Au,et al.  Data hiding for halftone images , 2000, Electronic Imaging.

[306]  Fernando Pérez-González,et al.  Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images , 1998, IEEE J. Sel. Areas Commun..

[307]  Nasir D. Memon,et al.  Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.

[308]  Robert H. Deng,et al.  Trellis-coded multidimensional phase modulation , 1990, IEEE Trans. Inf. Theory.

[309]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[310]  Mark F. Bocko,et al.  A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection , 2006, IEEE Transactions on Information Forensics and Security.

[311]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[312]  Leo Marks Between Silk and Cyanide: A Codemaker's War, 1941-1945 , 1998 .

[313]  Pierre Moulin,et al.  An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[314]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[315]  Jürgen Herre,et al.  AudioID: Towards Content-Based Identification of Audio Material , 2001 .

[316]  D. Casasent,et al.  New optical transforms for pattern recognition , 1977, Proceedings of the IEEE.

[317]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[318]  Jaejin Lee,et al.  Authentication and correction of digital watermarking images , 1999 .

[319]  David J. Sakrison,et al.  The effects of a visual fidelity criterion of the encoding of images , 1974, IEEE Trans. Inf. Theory.

[320]  Qiao Li,et al.  Rational dither modulation watermarking using a perceptual model , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[321]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.

[322]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[323]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[324]  Peter Eisert,et al.  Digital watermarking of MPEG-4 facial animation parameters , 1998, Comput. Graph..

[325]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[326]  Fernando Pérez-González,et al.  Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[327]  Andrew B. Watson,et al.  Digital images and human vision , 1993 .

[328]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[329]  Thomas S. Huang,et al.  Blind digital watermarking for images and videos and performance analysis , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[330]  Dinu Coltuc,et al.  Distortion-free robust watermarking: a case study , 2007, Electronic Imaging.

[331]  Hiroshi Murase,et al.  Visual learning and recognition of 3-d objects from appearance , 2005, International Journal of Computer Vision.

[332]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[333]  Constantin Papaodysseus,et al.  On the automated recognition of seriously distorted musical recordings , 2001, IEEE Trans. Signal Process..

[334]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[335]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[336]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[337]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[338]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[339]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[340]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.