Skip to main content

Modulation and information hiding in images

  • Conference paper
  • First Online:
Information Hiding (IH 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Included in the following conference series:

Abstract

We use concepts from communication theory to characterize information hiding schemes: the amount of information that can be hidden, its perceptibility, and its robustness to removal can be modeled using the quantities channel capacity, signal-to-noise ratio, and jamming margin. We then introduce new information hiding schemes whose parameters can easily be adjusted to trade off capacity, imperceptibility, and robustness as required in the application. The theory indicates the most aggressive feasible parameter settings. We also introduce a technique called predistortion for increasing resistance to JPEG compression. Analogous tactics are presumably possible whenever a model of anticipated distortion is available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Bender, D. Gruhl, and N. Morimoto. Techniques for data hiding. In Proceedings of the SPIE, pages 2420–2440, San Jose, CA, February 1991.

    Google Scholar 

  2. M.F. Barnsley and L.P. Hurd. Fractal Image Compression. AK Peters, Ltd., Wellesley, Massachusetts, 1993.

    Google Scholar 

  3. F.M. Boland, J.J.K. O'Ruanaidh, and C Dautzenberg. Watermarking digital images for copyright protection. In Proceedings, IEE International Conference on Image Processing and its Application, Edinburgh, 1995.

    Google Scholar 

  4. I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. This volume.

    Google Scholar 

  5. Digimarc Corporation. Identification/authentication coding method and apparatus. U.S. Patent Application, June 1995.

    Google Scholar 

  6. R.C. Dixon. Spread Spectrum Systems with Commercial Applications. John Wiley and Sons, New York, 1994.

    Google Scholar 

  7. B. Pfitzmann. Trials of traced traitors. This volume.

    Google Scholar 

  8. T.J. Shepard. Decentralized Channel Management in Scalable Multihop Spread-Spectrum Packet Radio Networks. PhD thesis, Massachusetts Institute of Technology, July 1995.

    Google Scholar 

  9. M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt. The Spread Spectrum Communications Handbook. McGraw-Hill, New York, 1994.

    Google Scholar 

  10. C.E. Shannon and W.W. Weaver. The Mathematical Theory of Communication. The University of Illinois Press, Urbana, Illinois, 1949.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smith, J.R., Comiskey, B.O. (1996). Modulation and information hiding in images. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_42

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_42

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics