Skip to main content

Reliable Blind Information Hiding for Images

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

In this paper we present a new method for reliable blind image steganography that can hide and recover a message of substantial length within digital imagery while maintaining the original image size and dynamic range. Image processing, error-control coding, and spread spectrum techniques are utilized to conceal hidden data and the performance of the technique is illustrated. The message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, hidden communication, image tamperproofing, authentication, embedded control, and revision tracking.

Prepared through collaborative participation in the Advanced Telecommunication/Information Distribution Research Program (ATIRP) Consortium sponsored by the U.S. Army Research Laboratory under Cooperative Agreement DAAL01-96-2-002.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 1996.

    Google Scholar 

  2. M. Bossert and F. Hergert. Hard-and soft-decision decoding beyond the half minimum distance an algorithm for linear codes. IEEE Transactions on Information Theory, 32(5):709–714, Sep 1986.

    Google Scholar 

  3. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Technical Report 95-128, NEC Research Institute, Technical Report, August 1995.

    Google Scholar 

  4. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:243–246, September 1996.

    Google Scholar 

  5. P. Davern and M. Scott. Fractal based image steganography. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 279–294. Springer-Verlag Berlin, 1996.

    Chapter  Google Scholar 

  6. F. Hartung and B. Girod. Fast public-key watermarking of compressed video. Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, October 1997.

    Google Scholar 

  7. A.K. Jain. Fundamentals of Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs, NJ, 1989.

    MATH  Google Scholar 

  8. J.S. Lee. Digital image enhancement and noise filtering by use of local statistics. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2:165–168, March 1980.

    Google Scholar 

  9. R. Machado. Stego, 1997. http://www.fqa.com/romana/romanasoft/stego.html.

  10. E. Milbrandt. http://www.members/iquest.net/mrmil/stego.html, October 1997. Steganography Info and Archive.

  11. B. Pfitzmann. Information hiding terminology. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 347–350. Springer-Verlag Berlin, 1996.

    Chapter  Google Scholar 

  12. B. Pfitzmann. Trials of traced traitors. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 49–64. Springer-Verlag Berlin, 1996.

    Chapter  Google Scholar 

  13. C.I. Podilchuk and W. Zeng. Digital image watermarking using visual models. In B.E. Rogowitz and T.N. Pappas, editors, Human Vision and Electronic Imaging II, volume 3016, pages 100–111. SPIE, Feb 1997.

    Google Scholar 

  14. C.T. Retter. Decoding binary expansions of low-rate Reed-Solomon codes far beyond the BCH bound. Proceedings of the 1995 IEEE International Symposium on Information Theory, Whistler, British Columbia, page 276, Sep 1995.

    Google Scholar 

  15. B. Schneier. Applied Cryptography-Protocols, Algorithms, and Source Code in C. John Wiley and Sons, Inc., New York, NY, 1996.

    MATH  Google Scholar 

  16. M.K. Simon, J.K. Omura, R.A. Scholtz, and B. K. Levitt. Spread Sprectrum Communications, Volume I. Computer Science Press, Rockville, Maryland, 1985.

    Google Scholar 

  17. J.R. Smith and B.O. Comisky. Modulation and information hiding in images. In R. Anderson, editor, Information Hiding, First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 207–226. Springer-Verlag, Berlin, 1996.

    Chapter  Google Scholar 

  18. M.D. Swanson, B. Zhu, and A.H. Tewfik. Robust data hiding for images. Procedings of the IEEE Digital Signal Processing Workshop, Loen, Norway, pages 37–40, September 1996.

    Google Scholar 

  19. M.D. Swanson, B. Zhu, and A.H. Tewfik. Transparent robust image watermarking. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, III:211–214, September 1996.

    Google Scholar 

  20. K. Tanaka, Y. Nakamura, and K. Matsui. Embedding secret information into a dithered multi-level image. Proceedings of the IEEE Military Communications Conference, Monterey, CA, pages 216–220, 1990.

    Google Scholar 

  21. R. van Schyndel, A. Tirkel, and C. Osborne. A digital watermark. Proceedings of the IEEE International Conference on Image Processing, 2:86–90, 1994.

    Article  Google Scholar 

  22. R.B. Wolfgang and E.J. Delp. A watermark for digital images. Proceedings of the IEEE International Conference on Image Processing Lausanne, Switzerland III:219–222, September 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Marvel, L.M., Boncelet, C.G., Retter, C.T. (1998). Reliable Blind Information Hiding for Images. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics