Applications of data hiding in digital images

Summary form only given, as follows. The author introduces data hiding in digital imagery as a new and powerful technology with applications including robust digital watermarking of images for copyright protection, image fingerprinting and authentication, tamper detection in digital imagery, covert (invisible) communication using images, access control, copy control in DVDs, embedding subtitles and audio tracks in video signals, etc. Data hiding is a highly multidisciplinary field that combines image and signal processing with cryptography, communication theory, coding theory, signal compression, and the theory of visual perception.

[1]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[2]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[3]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[4]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[5]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Bin Zhu,et al.  Low bit rate near-transparent image coding , 1995, Defense, Security, and Sensing.

[7]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[8]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[9]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[10]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[11]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[12]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[13]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[14]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[15]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[16]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[17]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[18]  Bernd Girod,et al.  Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.

[19]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[20]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[22]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[23]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[24]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[25]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[26]  B. Zhu,et al.  Transparent robust authentication and distortion measurement technique for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[27]  Jessica Fridrich Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.

[28]  David Kahn,et al.  The History of Steganography , 1996, Information Hiding.

[29]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[30]  William G. Chambers Basics of Communications and Coding , 1985 .

[31]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[32]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[33]  Andrew Z. Tirkel,et al.  TOWARDS A ROBUST DIGITAL WATERMARK , 1995 .

[34]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[35]  J P Smith Authentication of digital medical images with digital signature technology. , 1995, Radiology.

[36]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[37]  J. M. Foley,et al.  Contrast masking in human vision. , 1980, Journal of the Optical Society of America.

[38]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[39]  Andrew Z. Tirkel,et al.  A TWO-DIMENSIONAL DIGITAL WATERMARK , 1995 .

[40]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[41]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.

[42]  Akihiro Yamamoto,et al.  A digital watermark based on the wavelet transform and its robustness on image compression , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[43]  Ton Kalker Watermark Estimation through Detector Observations , 1998 .

[44]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[45]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[46]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[47]  R. Blahut Theory and practice of error control codes , 1983 .

[48]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.

[49]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[50]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[51]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[52]  Jian Zhao A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS , 1996 .

[53]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[54]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[55]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[56]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[57]  Feng Lin,et al.  Representations that uniquely characterize images modulo translation, rotation, and scaling , 1996, Pattern Recognit. Lett..

[58]  Kineo Matsui,et al.  Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.

[59]  O. Rioul,et al.  Wavelets and signal processing , 1991, IEEE Signal Processing Magazine.

[60]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[61]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[62]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[63]  Ting Chen,et al.  Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[64]  J.L. Massey,et al.  Theory and practice of error control codes , 1986, Proceedings of the IEEE.

[65]  Ahmed H. Tewfik,et al.  Multiresolution video watermarking using perceptual models and scene segmentation , 1997, Proceedings of International Conference on Image Processing.

[66]  Jonathan N. Bradley,et al.  Data embedding method , 1996, Other Conferences.

[67]  Fabien A. P. Petitcolas,et al.  Weakness of existing watermarking schemes , 1997 .

[68]  Norman B. Nill,et al.  A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment , 1985, IEEE Trans. Commun..

[69]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[70]  Mark Ettinger,et al.  Steganalysis and Game Equilibria , 1998, Information Hiding.

[71]  Gordon W. Braudaway,et al.  Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.

[72]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[73]  Pamela Samuelson,et al.  Copyright and digital libraries , 1995, CACM.

[74]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[75]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[76]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[77]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[78]  Christophe De Vleeschouwer,et al.  Digital watermarking of images , 1996 .

[79]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[80]  Peter Wayner Disappearing cryptography - being and nothingness on the net , 1996 .

[81]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[82]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[83]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[84]  Zixiang Xiong,et al.  Multiresolution watermarking for images and video: a unified approach , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[85]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[86]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[87]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[88]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[89]  Lawrence O'Gorman,et al.  Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.

[90]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[91]  Robert J. Safranek,et al.  Perceptual coding of images , 1993, Electronic Imaging.

[92]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[93]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[94]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[95]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[96]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[97]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[98]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[99]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[100]  Cornelius W. A. M. van Overveld,et al.  Digital watermarking by geometric warping , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[101]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[102]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[103]  Bernd Girod,et al.  The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals , 1989, Photonics West - Lasers and Applications in Science and Engineering.