Advertisement

Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images

  • Tran Minh Triet
  • Duong Anh Duc
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Abstract

Watermarking techniques can be applied in many applications, such as copyright protection, authentication, fingerprinting, and data hiding. Each different purpose of usability requires different approaches and schemes. In this paper, we present the framework of combining the Advanced Encryption Standard (AES) with watermarking techniques for hiding secret information in digital images. This framework can also be customized for other type of multimedia objects.

Keywords

Extended Version Watermark Image Secret Message Block Cipher Advance Encryption Standard 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Daemen, J., Rijmen, V.: AES Proposal: Rijndael. AES Algorithm Submission (1999)Google Scholar
  2. 2.
    Duc, D.A., Triet, T.M., Co, L.H.: The extended version of the Rijndael Block Cipher. Journal of Institute of Mathematics and Computer Sciences, India (2001)Google Scholar
  3. 3.
    Triet, T.M.: Research in Some Issues on Information Security and Applications. MSc Thesis, University of Natural Sciences, VNUHCM, Vietnam (2005)Google Scholar
  4. 4.
    Duc, D.A., Triet, T.M., Co, L.H.: The extended Rijndael-like Block Ciphers. In: International Conference on Information Technology: Coding and Computing - 2002, The Orleans, Las Vegas, Nevada, USA (2002)Google Scholar
  5. 5.
    Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Advances in Cryptology (1996)Google Scholar
  6. 6.
    Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral Dissertation, K.U.Leuven (1995)Google Scholar
  7. 7.
    Jakobsen, T., Knudsen, L.R.: The interpolation attack on block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  8. 8.
    Duc, D.A., Triet, T.M., Tuan, D., Lam, H.N.: Watermarking – An overview and applications in Intellectual Property Management and Protection. In: Proc. 3rd Scientific Conference of Hochiminh City University of Natural Sciences, Vietnam (2002)Google Scholar
  9. 9.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, London (2000)Google Scholar
  10. 10.
    Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing (1998)Google Scholar
  11. 11.
    Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT domain system for robust image watermrking. Signal (1998)Google Scholar
  12. 12.
    Meerwarld, P.: Digital Image Watermarking in the Wavelet Transfrom Domain. Salburg (2001)Google Scholar
  13. 13.
    Zhu, W., Xiong, Z., Zhang, Y.: Multiresolution watermarking for image and video. In: Proc. IEEE Inter. Conf. Image Processing (1998)Google Scholar
  14. 14.
    Hsu, C., Wu, J.: Hidden signatures in images. In: Proc. IEEE Inter. Conf. Image Processing (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Tran Minh Triet
    • 1
  • Duong Anh Duc
    • 1
  1. 1.Faculty of Information TechnologyUniversity of Natural Sciences, VNU-HCMCHochiminh CityVietnam

Personalised recommendations