2002
DOI: 10.1109/tip.2002.802512
|View full text |Cite
|
Sign up to set email alerts
|

A framework for evaluating the data-hiding capacity of image sources

Abstract: An information-theoretic model for image watermarking and data hiding is presented in this paper. Previous theoretical results are used to characterize the fundamental capacity limits of image watermarking and data-hiding systems. Capacity is determined by the statistical model used for the host image, by the distortion constraints on the data hider and the attacker, and by the information available to the data hider, to the attacker, and to the decoder. We consider autoregressive, block-DCT, and wavelet stati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
97
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 160 publications
(97 citation statements)
references
References 37 publications
(74 reference statements)
0
97
0
Order By: Relevance
“…But, it may then be possible to use (n+1) order statistics for steganalysis. The research in (Moulin & Mihcak, 2002) provides an estimate of steganography capacity of images, based on a parallel Gaussian model.…”
Section: Steganography Capacitymentioning
confidence: 99%
“…But, it may then be possible to use (n+1) order statistics for steganalysis. The research in (Moulin & Mihcak, 2002) provides an estimate of steganography capacity of images, based on a parallel Gaussian model.…”
Section: Steganography Capacitymentioning
confidence: 99%
“…Therefore, the relevant problem of stochastic image modeling is reduced to the proper modeling of wavelet coefficients. A. Hjorungnes, J. Lervik and T. Ramstad 20 have proposed a simple and tractable model that has found a number of applications in state-of-the-art image coding (EQ-coder 21 ), denoising (wavelet Wiener filter 22 ) and watermarking for evaluation of data-hiding capacity 23 and content-adaptive data-hiding.…”
Section: Inverse Halftoning: Practical Low-complexity Algorithmmentioning
confidence: 99%
“…In steganographic applications, the hidden data are a secret message whose mere presence within the host data set should be undetectable; a classical example is that of a prisoner communicating with the outside world under the supervision of a prison warden. In this context, the data hiding represents a useful alternative to the construction of a hypermedia document, which may be less convenient to manipulate [3].…”
Section: Introductionmentioning
confidence: 99%