Abstract
We use concepts from communication theory to characterize information hiding schemes: the amount of information that can be hidden, its perceptibility, and its robustness to removal can be modeled using the quantities channel capacity, signal-to-noise ratio, and jamming margin. We then introduce new information hiding schemes whose parameters can easily be adjusted to trade off capacity, imperceptibility, and robustness as required in the application. The theory indicates the most aggressive feasible parameter settings. We also introduce a technique called predistortion for increasing resistance to JPEG compression. Analogous tactics are presumably possible whenever a model of anticipated distortion is available.
Preview
Unable to display preview. Download preview PDF.
References
W. Bender, D. Gruhl, and N. Morimoto. Techniques for data hiding. In Proceedings of the SPIE, pages 2420–2440, San Jose, CA, February 1991.
M.F. Barnsley and L.P. Hurd. Fractal Image Compression. AK Peters, Ltd., Wellesley, Massachusetts, 1993.
F.M. Boland, J.J.K. O'Ruanaidh, and C Dautzenberg. Watermarking digital images for copyright protection. In Proceedings, IEE International Conference on Image Processing and its Application, Edinburgh, 1995.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. This volume.
Digimarc Corporation. Identification/authentication coding method and apparatus. U.S. Patent Application, June 1995.
R.C. Dixon. Spread Spectrum Systems with Commercial Applications. John Wiley and Sons, New York, 1994.
B. Pfitzmann. Trials of traced traitors. This volume.
T.J. Shepard. Decentralized Channel Management in Scalable Multihop Spread-Spectrum Packet Radio Networks. PhD thesis, Massachusetts Institute of Technology, July 1995.
M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt. The Spread Spectrum Communications Handbook. McGraw-Hill, New York, 1994.
C.E. Shannon and W.W. Weaver. The Mathematical Theory of Communication. The University of Illinois Press, Urbana, Illinois, 1949.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Smith, J.R., Comiskey, B.O. (1996). Modulation and information hiding in images. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_42
Download citation
DOI: https://doi.org/10.1007/3-540-61996-8_42
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61996-3
Online ISBN: 978-3-540-49589-5
eBook Packages: Springer Book Archive