Abstract
Securely embedding data in digital images has important applications for covert communication and copyright protection. The specific algorithm used to embed information depends on the characteristics of the application. Two prominent techniques for embedding information are least-significant-bit modification and discrete-cosine-transform modification. Detecting modifications to a high bit-rate signal such as a digital image can be difficult and is the subject of cross-disciplinary research in statistics and signal processing. This chapter gives an overview of the important issues associated with security imaging with specific examples of techniques to embed and detect hidden information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- DCT:
-
Discrete cosine transform
- LSB:
-
Least significant bit of a binary number
- YCrCb:
-
A representation of an RGB color in terms of its luminance (Y) and chrominance (Cr and Cb) components
References
Chandramouli R, Kharrazi M, Memon N (2004) Image steganography and steganalysis: concepts and practice, vol 2939, Lecture notes in computer science. Springer, Heidelberg
Cox I, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis, vol 2578, Lecture notes in computer science. Springer, Heidelberg, pp 355–372
Ker A (2005) Improved detection of LSB steganography in grayscale images, vol 3200, Lecture notes in computer science. Springer, Heidelberg, pp 97–115
Lee K, Westfeld A, Lee S (2006) Category attack for LSB steganalysis of JPEG images, vol 4283, Lecture notes in computer science. Springer, Heidelberg, pp 35–48
Ming C, Ru Z, Xinxin N, Yixian Y (2006) Analysis of current steganography tools: classification and features. Intelligent information hiding and multimedia signal processing 2006, pp 384–387
Mohanty S, Ramakrishnan K, Kankanhalli M (2000) A DCT domain visible watermarking technique for images. IEEE Int Conf Multimedia 2:1029–1032
Moulin P, Mihcak M (2002) A framework for evaluating the data-hiding capacity of image sources. IEEE Trans Image Process 11(9):1029–1042
Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th USENIX security symposium, vol 10, Washington DC, pp 323–335
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44
Westerfeld A (2001) F5 – a steganographic algorithm: high capacity despite better steganalysis, vol 2137, Lecture notes in computer science. Springer, Heidelberg, pp 289–302
Further Reading
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, Burlington
Katzenbeisser S (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood
Salomon D (2003) Data privacy and security. Springer, New York
Wayner P (2009) Information hiding: steganography and watermarking, 3rd edn. Morgan Kaufman, Burlington
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this entry
Cite this entry
Taranovsky, D. (2016). Security Imaging: Data Hiding and Digital Watermarking. In: Chen, J., Cranton, W., Fihn, M. (eds) Handbook of Visual Display Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-14346-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-14346-0_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14345-3
Online ISBN: 978-3-319-14346-0
eBook Packages: EngineeringReference Module Computer Science and Engineering