Abstract
In this paper we present a novel approach to information hiding. We investigate the possibility of embedding information using in some way the naturally pseudorandomness of some classes of coverdocuments. In particular we provide algorithms for embedding any binary string in an image belonging to a particular class of images, the image mosaics. The algorithms presented allow different levels of security for the information hidden in the cover-document. We also show some techniques to reduce the amount of information the users have to secretly store.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Anderson, R. Needham, and A. Shamir. Steganographyc file system. In Proceedings of 2nd Workshop on Information Hiding, pages 73–82, 1998.
R.J. Anderson. Stretching the limits of steganography. In First Workshop on Information Hiding, pages 39–48, 1996.
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the des modes of operation. In Proceedings of 38th IEEE Symposium on Foudations of Computer Science, 1997.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM System Journal, 3 and 4:313–336, 1996.
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In Proceedings of IEEE International Conference on Image Processing, pages 243–246, 1996.
A. Finkelstein and M. Range. Image mosaics. In R.D. Hersch, J. André, and H. Brown, editors, Proceedings of EP’98 and RIDT’98 Conferences, pages 11–22, 1998.
S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28:270–299, 1984.
C.E. Jacobs, A. Finkelstein, and D.H. Salesin. Fast multiresolution image querying. In Proceedings of SIGGRAPH 95, 1995.
A. J. Menenez, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography CRC Press, 1997.
W. Niblack, R. Barber, and W. Equitz et. al. The qbic project: Querying images by content using color, texture, and shape. In Storage and Retrieval for Image and Video Databases, SPIE, pages 173–187, 1993.
M. E. Ogle. Chabot: Retrieval from a relational database of images. Computer, 28(9):40–48, 1995.
F.A. Peticolas, R.J. Anderson, and M.G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062–1078, July 1999.
B. Pfitzmann. Information hiding terminology. In Proceedings of 1st Workshop on Information Hiding, pages 347–350, 1996.
I. Pitas. A method for signature casting on digital images. In International Conference on Image Processing, volume 3, pages 215–218, 1996.
C.I. Podilchuk and W. Zeng. Digital image watermarking using visual models. Human Visual and Electronic Imaging II, 3016:100–111, 1997.
R. Silvers. Photomosaics. http://www.photomosaic.com .
M.D. Swanson, B. Zhu, and A.H. Tewfik. Trasparent robust image watermarking. In Proceedings of IEEE International Conference on Image Processing, volume III, pages 211–214, 1996.
R. van Schyndel, A. Tirkel, and C. Osborne. A digital watermarking. In Proceedings of IEEE International Conference on Image Processing, pages 86–90, 1994.
R.B. Wolfgang and E.J. Delp. A watermarking for digital images. In Proceedings of IEEE International Conference on Image Processing, pages 219–222, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blundo, C., Galdi, C. (2000). Steganography Using Modern Arts. In: van Leeuwen, J., Watanabe, O., Hagiya, M., Mosses, P.D., Ito, T. (eds) Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics. TCS 2000. Lecture Notes in Computer Science, vol 1872. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44929-9_12
Download citation
DOI: https://doi.org/10.1007/3-540-44929-9_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67823-6
Online ISBN: 978-3-540-44929-4
eBook Packages: Springer Book Archive