2008
DOI: 10.1109/tmm.2008.921733
|View full text |Cite
|
Sign up to set email alerts
|

Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques

Abstract: A novel data-hiding methodology, denoted as digital invisible ink (DII), is proposed to implement secure steganography systems. Like the real-world invisible ink, secret messages will be correctly revealed only after the marked works undergo certain prenegotiated manipulations, such as lossy compression and processing. Different from conventional data-hiding schemes where content processing or compression operations are undesirable, distortions caused by prenegotiated manipulations in DII-based schemes are ind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 19 publications
(11 reference statements)
0
3
0
Order By: Relevance
“…[ 5–8 ] However, such way to convey information using completely invisible forms (such as a blank sheet of paper) may arouse suspicion over a supervised channel. [ 9 ] One way to further improve the security of invisible ink is to hide the information into cover texts written in regular ink. In this way, the obtained stego‐text is visible under ambient light and the hidden text can be displayed under specific detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…[ 5–8 ] However, such way to convey information using completely invisible forms (such as a blank sheet of paper) may arouse suspicion over a supervised channel. [ 9 ] One way to further improve the security of invisible ink is to hide the information into cover texts written in regular ink. In this way, the obtained stego‐text is visible under ambient light and the hidden text can be displayed under specific detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…Currently multimedia contents are distributed over the Internet more and more, and protecting their legal copyright ownership becomes critical gradually. There have been many studies about using digital watermarks to solve the copyright protection problem [1][2][3][4], and as a re-a) 경희대학교 전자•전파공학과 (Kyung Hee University, Department of Electronics and Radio Engineering) ‡Corresponding Author : 손원(Won Sohn) sult contents owners can embed their logos or personal information into the multimedia contents to protect their copyrights.…”
Section: ⅰ Introductionmentioning
confidence: 99%
“…1 With the development of information hiding technology in recent ten years, a variety of voice hiding algorithm has been proposed. For example, Bender, et al [1] proposed phase coding, Huang [2] and Oktay [3] proposed spread hiding algorithm, Chen [4] and Mitra [5] proposed echo masking algorithm, Kang [6] proposed patchwork algorithm. At the same time, algorithms for a variety of hidden secret information analysis techniques are also developing rapidly [7][8][9], these methods are based on time domain or frequency domain analysis.…”
Section: Introductionmentioning
confidence: 99%