Information Hiding Techniques for Steganography and Digital Watermaking

From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

[1]  Moni Naor,et al.  Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.

[2]  Andreas Westfeld,et al.  Steganography in a Video Conferencing System , 1998, Information Hiding.

[3]  Mauro Barni,et al.  Robust watermarking of still images for copyright protection , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[4]  Shelby Pereira,et al.  Secure robust digital image watermark , 1998, Other Conferences.

[5]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[6]  Bernd Girod,et al.  Digital watermarking of MPEG-2 coded video in the bitstream domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[7]  Jean-Paul M. G. Linnartz The "Ticket" Concept for Copy Control Based on Embedded Signalling , 1998, ESORICS.

[8]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[9]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[10]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[11]  Barry Rodger Ascertaining the Statutory Lex Loci Delicti : Certain Difficulties Under the Private International Law (Miscellaneous Provisions) Act 1995 , 1998 .

[12]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[13]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[14]  Amos Fiat,et al.  Tracing traitors , 2000, IEEE Trans. Inf. Theory.

[15]  Joyce E. Farrell,et al.  Perceptual quality metric for digitally coded color images , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[16]  Sushil Jajodia,et al.  Recovering Watermarks from Images , 1999 .

[17]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[18]  C. G. J. Morse,et al.  Torts in Private International Law: A New Statutory Framework , 1996, International and Comparative Law Quarterly.

[19]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[20]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[21]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[22]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[23]  Ira S. Moskowitz,et al.  Covert Channels - A Context-Based View , 1996, Information Hiding.

[24]  Lawrence Collins,et al.  Interaction between Contract and Tort in the Conflict of Laws , 1967 .

[25]  E. Owens Introduction to the Psychology of Hearing , 1977 .

[26]  Simmons,et al.  The Subliminal Channel and Digital Signatures , 2022 .

[27]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[28]  Nicholas F. Maxemchuk,et al.  Electronic document distribution , 1994, AT&T Technical Journal.

[29]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[30]  Jean-Paul M. G. Linnartz,et al.  Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks , 1998, Information Hiding.

[31]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[32]  John Humphrey Carlile Morris,et al.  The Proper Law of a Tort , 1951 .

[33]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[34]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[35]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[36]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[37]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[38]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[39]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[40]  C.-C. Jay Kuo,et al.  Image protection via watermarking on perceptually significant wavelet coefficients , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[41]  Mauro Barni,et al.  Mask building for perceptually hiding frequency embedded watermarks , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[42]  Eckhard Koch,et al.  Copyright Protection for Multimedia Data , 1994 .

[43]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[44]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[45]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[46]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .

[47]  Jiri Fridrich A New Steganographic Method for Palette-Based Images , 1999, PICS.

[48]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.

[49]  Francis Rose,et al.  Lloyd's Maritime and Commercial Law Quarterly , 2001 .

[50]  Frans M. J. Willems,et al.  Universal data compression and repetition times , 1989, IEEE Trans. Inf. Theory.

[51]  Ernest G. Lorenzen Restatement of the Conflict of Laws , 1935 .

[52]  A. Froomkin Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases , 1996 .

[53]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[54]  Reginald L. Lagendijk,et al.  Perceptual image quality based on a multiple channel HVS model , 1995, 1995 International Conference on Acoustics, Speech, and Signal Processing.

[55]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[56]  Jian Zhao A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS , 1996 .

[57]  Ross J. Anderson Why cryptosystems fail , 1994, CACM.

[58]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[59]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[60]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[61]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[62]  Arnaud E. Jacquin,et al.  Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..

[63]  David Chaum,et al.  Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..

[64]  Serge Vaudenay,et al.  The Newton Channel , 1996, Information Hiding.

[65]  Neil F. Johnson An Introduction to Watermark Recovery from Images , 1999 .

[66]  Boon-Lock Yeo,et al.  Technical trials and legal tribulations , 1998, CACM.

[67]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[68]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[69]  Patrick Ian Ross Bernstein v. United States Department of State , 1998 .

[70]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[71]  Michel Barlaud,et al.  Image coding using wavelet transform , 1992, IEEE Trans. Image Process..

[72]  L.,et al.  SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .

[73]  Adrian Perrig,et al.  A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.

[74]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[75]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[76]  P. B. Carter Choice of Law in Tort: The Role of the Lex Fori , 1995 .

[77]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[78]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[79]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[80]  Ross J. Anderson Liability and Computer Security: Nine Principles , 1994, ESORICS.

[81]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[82]  Lisa M. Marvel,et al.  Reliable Blind Information Hiding for Images , 1998, Information Hiding.

[83]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[84]  Jean-Francois Delaigle,et al.  A Block Based Watermarking Technique for MPEG2 Signals: Optimization and Validation on Real Digital TV Distribution Links , 1998, ECMAST.

[85]  Steven H. Low,et al.  Modeling Cryptographic Protocols and Their Collusion Analysis , 1996, Information Hiding.

[86]  Ross Anderson,et al.  The Global Internet Trust Register , 1999 .

[87]  Christopher Kuner,et al.  Dispute Resolution in International Electronic Commerce , 1997 .

[88]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[89]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[90]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[91]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[92]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[93]  Birgit Pfitzmann,et al.  Anonymous Fingerprinting , 1997, EUROCRYPT.

[94]  Stefan Winkler,et al.  A perceptual distortion metric for digital color images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[95]  Peter Wayner,et al.  Mimic Functions , 1992, Cryptologia.

[96]  Jean-Luc Dugelay,et al.  Image watermarking based on the fractal transform: a draft demonstration , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[97]  Sushil Jajodia,et al.  A Role for Digital Watermarking in Electronic Commerce , 1999 .

[98]  Birgit Pfitzmann,et al.  Asymmetric fingerprinting for larger collusions , 1997, CCS '97.

[99]  Michael A. Gerzon,et al.  A High-Rate Buried-Data Channel for Audio CD , 1995 .

[100]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[101]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[102]  Paul S. Heckbert Color image quantization for frame buffer display , 1982, SIGGRAPH.

[103]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[104]  Robert J. Hart,et al.  Legal protection of computer programs in Europe - a guide to the EC Directive: by Bridgit Czarnota and Robert J Hart, 1991 (Hardcover) (Butterworths), 218 pp, 75.00, ISBN 0-406-00542-7 , 1992, Comput. Law Secur. Rev..

[105]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[106]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[107]  Julie S. Sheinblatt The WIPO Copyright Treaty , 1998 .

[108]  Barbara Cohen A Proposed Regime for Copyright Protection on the Internet , 1996 .

[109]  Virgil D. Gligor,et al.  A guide to understanding covert channel analysis of trusted systems , 1993 .

[110]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[111]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[112]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[113]  Christopher George John Morse Torts in Private International Law , 1980 .

[114]  Richard A. Kemmerer,et al.  Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.

[115]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[116]  Jonathan N. Bradley,et al.  Data embedding method , 1996, Other Conferences.

[117]  X G Xia,et al.  Wavelet transform based watermark for digital images. , 1998, Optics express.

[118]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[119]  Catherine A. Meadows,et al.  Fingerprinting Long Forgiving Messages , 1985, CRYPTO.

[120]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[121]  Adi Shamir,et al.  The Steganographic File System , 1998, Information Hiding.

[122]  M. Hayes The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform , 1982 .

[123]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[124]  Gonzalo R. Arce,et al.  A blind wavelet based digital signature for image authentication , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[125]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[126]  R A Olshen,et al.  Thoracic CT images: effect of lossy image compression on diagnostic accuracy. , 1994, Radiology.

[127]  Julie E. Cohen Some Reflections on Copyright Management Systems and Laws Designed to Protect Them , 1997 .

[128]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[129]  Gordon W. Braudaway,et al.  Protecting publicly-available images with an invisible image watermark , 1996, Proceedings of International Conference on Image Processing.

[130]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[131]  Pamela Samuelson,et al.  Copyright and digital libraries , 1995, CACM.

[132]  Birgit Pfitzmann,et al.  Asymmetric fingerprinting , 1996 .

[133]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[134]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[135]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[136]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[137]  Jean-Paul M. G. Linnartz,et al.  Improved watermark detection reliability using filtering before correlation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[138]  Steven H. Low,et al.  Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..

[139]  P. E. Nygh Some Thoughts on the Proper Law of a Tort , 1977 .

[140]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[141]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[142]  Ira S. Moskowitz,et al.  Critical analysis of security in voice hiding techniques , 1997, ICICS.

[143]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[144]  Dorothy Glancy PRIVACY AND INTELLIGENT TRANSPORTATION TECHNOLOGY , 1995 .

[145]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[146]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[147]  Olivier Hance,et al.  Privacy and the internet: Intrusion, surveillance and personal data , 1996 .

[148]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[149]  P. Lapostolle Collection Technique et Scientifique des Télécommunications , 1978 .

[150]  Wenjun Zeng,et al.  Extraction of multiresolution watermark images for resolving rightful ownership , 1999, Electronic Imaging.

[151]  Tom Mulhall Special feature: Where have all the hackers gone? A study in motivation, deterrence, and crime displacement , 1997 .

[152]  Jane C. Ginsburg,et al.  Computer Programs in Europe: A Comparative Analysis of the 1991 EC Software Directive , 1992 .

[153]  Jessa Netting,et al.  Spies like us , 2000 .

[154]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[155]  Fernando Pérez-González,et al.  The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[156]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[157]  Doron Shaked,et al.  Watermarking of dither halftoned images , 1999, Electronic Imaging.

[158]  Steven H. Low,et al.  Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..

[159]  Stefan Winkler,et al.  Perceptual distortion metric for digital color video , 1999, Electronic Imaging.

[160]  Steven K. Rogers,et al.  Perceptual-based hyperspectral image fusion using multiresolution analysis , 1995 .

[161]  Fabien A. P. Petitcolas,et al.  Weaknesses of copyright marking systems , 1998 .

[162]  Pippa Rogerson Choice of Law in Tort: A Missed Opportunity? , 1995 .

[163]  M. Zweig,et al.  Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine. , 1993, Clinical chemistry.

[164]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[165]  Yvo Desmedt,et al.  SUBLIMINAL-FREE AUTHENTICATION AND SIGNATURE , 1988 .

[166]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[167]  J Rees,et al.  Intellectual property , 2001, The Lancet.

[168]  Nasir D. Memon,et al.  Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System , 1999, Electronic Imaging.