Skip to main content

Security Imaging: Data Hiding and Digital Watermarking

  • Reference work entry
  • First Online:
Handbook of Visual Display Technology

Abstract

Securely embedding data in digital images has important applications for covert communication and copyright protection. The specific algorithm used to embed information depends on the characteristics of the application. Two prominent techniques for embedding information are least-significant-bit modification and discrete-cosine-transform modification. Detecting modifications to a high bit-rate signal such as a digital image can be difficult and is the subject of cross-disciplinary research in statistics and signal processing. This chapter gives an overview of the important issues associated with security imaging with specific examples of techniques to embed and detect hidden information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 1,399.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 1,999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Abbreviations

DCT:

Discrete cosine transform

LSB:

Least significant bit of a binary number

YCrCb:

A representation of an RGB color in terms of its luminance (Y) and chrominance (Cr and Cb) components

References

  • Chandramouli R, Kharrazi M, Memon N (2004) Image steganography and steganalysis: concepts and practice, vol 2939, Lecture notes in computer science. Springer, Heidelberg

    Google Scholar 

  • Cox I, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  • Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis, vol 2578, Lecture notes in computer science. Springer, Heidelberg, pp 355–372

    MATH  Google Scholar 

  • Ker A (2005) Improved detection of LSB steganography in grayscale images, vol 3200, Lecture notes in computer science. Springer, Heidelberg, pp 97–115

    Google Scholar 

  • Lee K, Westfeld A, Lee S (2006) Category attack for LSB steganalysis of JPEG images, vol 4283, Lecture notes in computer science. Springer, Heidelberg, pp 35–48

    Google Scholar 

  • Ming C, Ru Z, Xinxin N, Yixian Y (2006) Analysis of current steganography tools: classification and features. Intelligent information hiding and multimedia signal processing 2006, pp 384–387

    Google Scholar 

  • Mohanty S, Ramakrishnan K, Kankanhalli M (2000) A DCT domain visible watermarking technique for images. IEEE Int Conf Multimedia 2:1029–1032

    Google Scholar 

  • Moulin P, Mihcak M (2002) A framework for evaluating the data-hiding capacity of image sources. IEEE Trans Image Process 11(9):1029–1042

    Article  Google Scholar 

  • Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th USENIX security symposium, vol 10, Washington DC, pp 323–335

    Google Scholar 

  • Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44

    Article  Google Scholar 

  • Westerfeld A (2001) F5 – a steganographic algorithm: high capacity despite better steganalysis, vol 2137, Lecture notes in computer science. Springer, Heidelberg, pp 289–302

    MATH  Google Scholar 

Further Reading

  • Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufman, Burlington

    Google Scholar 

  • Katzenbeisser S (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Norwood

    Google Scholar 

  • Salomon D (2003) Data privacy and security. Springer, New York

    Book  MATH  Google Scholar 

  • Wayner P (2009) Information hiding: steganography and watermarking, 3rd edn. Morgan Kaufman, Burlington

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Taranovsky .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this entry

Cite this entry

Taranovsky, D. (2016). Security Imaging: Data Hiding and Digital Watermarking. In: Chen, J., Cranton, W., Fihn, M. (eds) Handbook of Visual Display Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-14346-0_31

Download citation

Publish with us

Policies and ethics