Results 1 
6 of
6
Steganography Capacity: A Steganalysis Perspective
, 2003
"... Two fundamental questions in steganography are addressed in this paper, namely, (a)deW0N4Z1 ofste==1WE==B y se=03' y and (b)deW4N0N0 ofsteJ=BWE=01=N capacity.Since the main goal ofsteJ=JWE=01 y is cove rt communications, we argue that the= de='1WE=Z must be de e=Z t on the type ofste&apos ..."
Abstract

Cited by 18 (3 self)
 Add to MetaCart
Two fundamental questions in steganography are addressed in this paper, namely, (a)deW0N4Z1 ofste==1WE==B y se=03' y and (b)deW4N0N0 ofsteJ=BWE=01=N capacity.Since the main goal ofsteJ=JWE=01 y is cove rt communications, we argue that the= de='1WE=Z must be de e=Z t on the type ofste'0=WE=Z0 dee'0= ee ye tobre4 the e mbeBJ13 algorithm.We propose ne deZ3ZWE=N forseZ300 y and capacity inthe preZ1Z3 of a steZ04WE=NN The intuition and mathe3'WE=4 notions supporting theJ de34NWE=4 are de113Z e Some nume1='3 examples are also presented to illustrate the need for this investigation.
Digital watermarking
 In Encyclopedia of Imaging Science and Technology
, 2002
"... ..."
(Show Context)
WATERFILLING: A CONNECTION BETWEEN INFORMATION THEORETIC AND PERCEPTUALLY BASED WATERMARKING
"... We present a hybrid approach to image watermarking that exploits results from both information theory and perceptual studies. Towards this purpose we use a waterfillingtype algorithm to establish a connection between information theoretic and perceptually based watermarking. Information theoretic c ..."
Abstract
 Add to MetaCart
We present a hybrid approach to image watermarking that exploits results from both information theory and perceptual studies. Towards this purpose we use a waterfillingtype algorithm to establish a connection between information theoretic and perceptually based watermarking. Information theoretic capacity formula for a Gaussian signal over a Gaussian channel is used and some parameters of the corresponding waterfillingtype algorithm are chosen based on a perceptual criterion. Image subblocks to be watermarked are chosen based on local statistics of each subblock and the embedded watermark strength for each of these subblocks are computed based on a perceptual criterion. Towards this end an iterative algorithm is proposed. Experimental results are presented to discuss the tradeoff between information theoretic capacity, robustness and perceptual distortion.
On the Complexity and Hardness of the Steganography Embedding Problem
"... We analyze the complexity of the steganography problem and show that the decision version of the problem is NPcomplete through transformation from the Knapsack problem. We also give a pseudopolynomial time algorithm to optimally solve the steganography problem. This optimal algorithm can also be a ..."
Abstract
 Add to MetaCart
We analyze the complexity of the steganography problem and show that the decision version of the problem is NPcomplete through transformation from the Knapsack problem. We also give a pseudopolynomial time algorithm to optimally solve the steganography problem. This optimal algorithm can also be applied to image steganography.
Data and Information Hiding on Color Images Using Digital
"... Water marking is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, th ..."
Abstract
 Add to MetaCart
Water marking is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of invisible water marking techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image water marking, its uses and techniques. It also attempts to identify the requirements of a good invisible water marking algorithm and briefly reflects on which water marking techniques are more suitable for which applications. Keywords: Digital images, hidden, water marking.
April 22, 2004 1:49 WSPC/Lecture Notes Series: 9in x 6in MAIN Image Steganography: Concepts and Practice
"... In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following tutorial we go over some general concepts and ideas that apply to steganography and steganalysis. We review and discuss the notions of steganographic secur ..."
Abstract
 Add to MetaCart
(Show Context)
In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following tutorial we go over some general concepts and ideas that apply to steganography and steganalysis. We review and discuss the notions of steganographic security and capacity. Some of the more recent image steganography and steganalysis techniques are analyzed with this perspective, and their contributions are highlighted. 1.