Text Steganography Based on Online Chat

An automated dental identification system (ADIS) for human identification in forensic dentistry requires automatic recognition of teeth in dental images. In this paper, we propose a multi-stage technique to classify teeth in multislice CT (MSCT) images. The proposed algorithm consists of the following three stages: segmentation, feature extraction and classification. We segmented the teeth based on our previous experiences. In the feature extraction stage, we introduced a multi-resolution method using wavelet-Fourier descriptor (WFD). Finally, we utilized WFD coefficients as feature vectors for classification in the third stage. Teeth classification is performed by a conventional supervised classifier for teeth identification. Experimental results reveal the effectiveness of the proposed method.

[1]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[2]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[3]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[4]  Daniel B. Horn,et al.  Patterns of entry and correction in large vocabulary continuous speech recognition systems , 1999, CHI '99.

[5]  M. Shirali-Shahreza,et al.  Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.

[6]  Wenyin Zhang,et al.  Chinese Text Watermarking Based on Occlusive Components , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[7]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[8]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[9]  Graham Rawlinson,et al.  The Significance of Letter Position in Word Recognition , 2007, IEEE Aerospace and Electronic Systems Magazine.

[10]  S. Shahreza Stealth steganography in SMS , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.

[11]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[12]  Martin Steinebach,et al.  A digital watermark for vector-based fonts , 2006, MM&Sec '06.

[13]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[14]  Xingming Sun,et al.  Component-based digital watermarking of Chinese texts , 2004, InfoSecu '04.

[15]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[16]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[17]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[18]  Geguang Pu,et al.  Chinese Text Watermarking Based on Occlusive Components , 2006 .