Skip to main content

Security Imaging: Data Hiding and Digital Watermarking

  • Living reference work entry
  • Latest version View entry history
  • First Online:
Handbook of Visual Display Technology
  • 32 Accesses

Abstract

Creating and distributing digital images can involve processing more than pixel colors. Information embedded in digital images is used to determine authorship, time stamps, qualitative information about the image, and other metadata. Higher security is needed for applications such as digital watermarking, ownership determination, and embedded covert messages. Innovative technology exists to embed data in a digital image that is retrievable, readable, but also irremovable and imperceptible. This section provides a survey of technology used to securely embed data in digital images for a wide range of applications including covert communication and conditional access rights. Example techniques are illustrated including least-significant-bit modification and discrete cosine transforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Abbreviations

DCT:

Discrete cosine transform

LSB:

Least significant bit of a binary number

RGB:

A color represented as a combination of its red, green, and blue color channels; often used in reference to a pixel color that has 24-bits of precision with 8-bit channels for each of its red, green, and blue components

YCrCb :

A representation of an RGB color in terms of its luminance (Y) and chrominance (Cr and Cb) components

References

  • Alhomoud A (2021) Image steganography in spatial domain: current status, techniques, and trends. Intell Autom Soft Comput 27:69–88

    Article  Google Scholar 

  • Baluja S (2017) Hiding images in plain sight: deep steganography. In: 31st conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4–9 December 2017

    Google Scholar 

  • Chandramouli R, Kharrazi M, Memon N (2004) Image steganography and steganalysis: concepts and practice. In: Kalker T, Cox I, Ro Y (eds) Digital watermarking. IWDW 2003. Lecture notes in computer science, vol 2939. Springer, Berlin/Heidelberg

    Google Scholar 

  • Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analyses of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  • Collins J, Agaian S (2016) High capacity image steganography using adjunctive numerical representations with multiple bit-plane decomposition methods. Int J Inf Secur 6(1):1–21

    Google Scholar 

  • Cox I, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  • Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. In: Petitcolas F (ed) Information hiding. IH 2002. Lecture notes in computer science, vol 2578. Springer, Berlin/Heidelberg

    Google Scholar 

  • Hamid N, Yahya A, Badlishah Ahmad R, Al-qershi M (2012) Image steganography techniques: an overview. Int J Comput Sci Secur 6(3)

    Google Scholar 

  • Kaur H, Rani J (2016) A survey on different techniques of steganography. MATEC Web Con 57:02003

    Article  Google Scholar 

  • Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Fridrich J (ed) Information hiding. IH 2004. Lecture notes in computer science, vol 3200. Springer, Berlin/Heidelberg

    Google Scholar 

  • Kharrazi M, Sencar H, Memon N (2004) Image steganography: concepts and practice. WSPC/lecture notes series 22

    Google Scholar 

  • Krenn J (2004) Steganography and steganalysis. http://www.krenn.nl/univ/cry/steg/article.pdf. Accessed 2022

  • Lashkari A, Manaf A, Masrom M, Daud S (2011) A survey on image steganography algorithms and evaluation. In: Snasel V, Platos J, El-Qawasmeh E (eds) Digital information processing and communications. ICDIPC 2011. Communications in computer and information science, vol 188. Springer, Berlin/Heidelberg

    Google Scholar 

  • Lee K, Westfeld A, Lee S (2006) Category attack for LSB steganalysis of JPEG images. In: Shi Y, Jeon B (eds) Digital watermarking. IWDW 2006. Lecture notes in computer science, vol 4283. Springer, Berlin/Heidelberg

    Google Scholar 

  • Ming C, Ru Z, Xinxin N, Yixian Y (2006) Analysis of current steganography tools: classification & features. In: Intelligent Information Hiding and Multimedia Signal Processing, pp 384–387

    Google Scholar 

  • Mohanty S, Ramakrishnan K, Kankanhalli M (2000) A DCT domain visible watermarking technique for images. IEEE Int Conf Multimedia 2:1029–1032

    Article  Google Scholar 

  • Moulin P, Mihcak M (2002) A framework for evaluating the data-hiding capacity of image sources. IEEE Trans Image Process 11(9):1029–1042

    Article  Google Scholar 

  • Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th USENIX security symposium, vol 10, pp 323–335

    Google Scholar 

  • Provos N, Honeyman P (2003) Hide and Seek: an introduction to steganography. IEEE Secur Priv 1:32–44

    Article  Google Scholar 

  • Ruchi R, Ghanekar U (2020) A brief review on image steganography techniques. In: Proceedings of ICAEEC-2019, IIIT Allahabad, India, May 31–June 1 2019. SSRN Electron J

    Google Scholar 

  • Sahu M (2015) Review of image steganography techniques in cloud security. Int J Recent Sci Res 2(2):21–25

    Google Scholar 

  • Sumathi C, Santanam T, Umamaheswari G (2013) A study of various steganography techniques used for information hiding. Int J Comput Sci Eng Surv 4(6):9–25

    Article  Google Scholar 

  • Westerfeld A (2001) F5 – a steganographic algorithm: high capacity despite better steganalysis. In: Moskowitz I (ed) IH 2001. Lecture notes in computer science, vol 2137. Springer, Berlin/Heidelberg

    Google Scholar 

Further Reading

  • Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, Burlington

    Google Scholar 

  • Katzenbeisser S (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood

    Google Scholar 

  • Salomon D (2003) Data privacy and security. Springer, New York

    Book  MATH  Google Scholar 

  • Wayner P (2009) Information hiding: steganography & watermarking, 3rd edn. Morgan Kaufman, Burlington

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Taranovsky .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer-Verlag GmbH Germany, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Taranovsky, D. (2023). Security Imaging: Data Hiding and Digital Watermarking. In: Blankenbach, K., Yan, Q., O'Brien, R.J. (eds) Handbook of Visual Display Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35947-7_31-3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35947-7_31-3

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35947-7

  • Online ISBN: 978-3-642-35947-7

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Security Imaging: Data Hiding and Digital Watermarking
    Published:
    20 January 2023

    DOI: https://doi.org/10.1007/978-3-642-35947-7_31-3

  2. Original

    Security Imaging: Data Hiding and Digital Watermarking
    Published:
    12 June 2015

    DOI: https://doi.org/10.1007/978-3-642-35947-7_31-2