Spread spectrum image steganography

In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

[1]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[2]  David L. Donoho,et al.  De-noising by soft-thresholding , 1995, IEEE Trans. Inf. Theory.

[3]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  L. J. Harcke,et al.  Laboratory and Flight Performance of the Mars Pathfinder (15,1/6) Convolutionally Encoded Telemetry Link , 1997 .

[5]  Martin Bossert,et al.  Hard- and soft-decision decoding beyond the half minimum distance---An algorithm for linear codes , 1986, IEEE Trans. Inf. Theory.

[6]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[7]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[8]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[9]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[11]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[12]  Andrew J. Viterbi,et al.  Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.

[13]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[14]  LeeJong-Sen Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980 .

[15]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[16]  Ahmed H. Tewfik,et al.  Data hiding for multimedia personalization, interaction, and protection , 1997 .

[17]  Michael Scott,et al.  Fractal Based Image Steganography , 1996, Information Hiding.

[18]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[19]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[20]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[21]  C. T. Retter Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[22]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[23]  J. Bednar,et al.  Alpha-trimmed means and their relationship to median filters , 1984 .

[24]  Jae S. Lim,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[25]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[26]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[27]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[28]  Jong-Sen Lee,et al.  Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.