Proceedings of the 8th Workshop on Multimedia and Security 2006
DOI: 10.1145/1161366.1161372
|View full text |Cite
|
Sign up to set email alerts
|

Digital invisible ink and its applications in steganography

Abstract: A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded as an extension of the informed-embedding methodology. Messages hidden in digital contents using digital invisible ink cannot be correctly or clearly revealed unless certain pre-negotiated manipulations have been applied to the marked work. To facilitate such behavior, models and implementations based on both spreadspectrum and quant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…There are many forms of steganography that have been used to hide a secret message .One of them is the usage of invisible ink which is unrelated to computer for hiding the secret messages by writing the message with clear ink and they can be seen only by other ink when applied on the another message .Invisible ink technique is limited use today [3]. Then concept come under steganography is the technique which is mainly used for businesses called watermarking.…”
Section: Different Forms Of Steganographymentioning
confidence: 99%
“…There are many forms of steganography that have been used to hide a secret message .One of them is the usage of invisible ink which is unrelated to computer for hiding the secret messages by writing the message with clear ink and they can be seen only by other ink when applied on the another message .Invisible ink technique is limited use today [3]. Then concept come under steganography is the technique which is mainly used for businesses called watermarking.…”
Section: Different Forms Of Steganographymentioning
confidence: 99%
“…Chun-Hsiang and others found that LSB or the final bit in a stream affects the smallest change while the first bit of the stream has the largest influence on color selection. If the LSB of every bit stream were to be allocated for a hidden message, the resulting image file would appear unaltered [8].…”
Section: International Journal Of Computer Applications (0975 -8887)mentioning
confidence: 99%
“…In some interesting cases, we will show that the cover message can be devised to help interpretation of the genuine messages. Note that the idea of digital invisible ink data hiding is firstly revealed in [15] and then briefly exploited in [16] by the authors. In this paper, we thoroughly describe the motivation, implementations and experimental results of digital-invisible-ink data hiding.…”
Section: The "Digital" Invisible Inkmentioning
confidence: 99%