1999
DOI: 10.1109/5.771065
|View full text |Cite
|
Sign up to set email alerts
|

Information hiding-a survey

Abstract: Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
767
0
9

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 1,931 publications
(816 citation statements)
references
References 90 publications
0
767
0
9
Order By: Relevance
“…This feature is different from other known codes, such as the common bar code. Another application might be embedding steganographic information [17][18][19] in halftone pictures. The ordinary visible image is conventionally encoded by the dots' sizes, whereas the steganographic image is encoded by their positions.…”
Section: Concealogram: An Image Within An Imagementioning
confidence: 99%
See 1 more Smart Citation
“…This feature is different from other known codes, such as the common bar code. Another application might be embedding steganographic information [17][18][19] in halftone pictures. The ordinary visible image is conventionally encoded by the dots' sizes, whereas the steganographic image is encoded by their positions.…”
Section: Concealogram: An Image Within An Imagementioning
confidence: 99%
“…The window's area is smaller than, or equal to, the area of the output plane. Similarly, in the input plane, projection P 2 onto the constraint set at the jth iteration is 19) where exp[iθ j (x, y)] is the phase function of g j (x, y) at the jth iteration. The iteration process is shown schematically in Figure 4.…”
Section: Encoding Of Images In a Halftone Picturementioning
confidence: 99%
“…Information Hiding techniques [3,19] like water-marking and steganography [15] focus on concealing data items within some stream of information (while, in a matter of speaking, ours hides information in the garbage). Our approach is similar to these techniques in that, given a negative database, it is infeasible to determine whether it represents any valid string (message) at all, i.e., if the corresponding positive database is non-empty; and in that knowledge of the existence of a message does not facilitate its retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…The strength of steganography can be improved by combining it with cryptography. The two close associates of steganography are watermarking [14,16] and fingerprinting which are widely used in copyright protection [15]. The main deviation of copyright protection from steganography is the presence of message is often known but robust to remove where as in a steganographic scheme imperceptibility is the crucial factor.…”
Section: Introductionmentioning
confidence: 99%
“…However the existence of communication is known to the snooper and this may lead to attempts to decrypt, modify or destroy the data. This lead to evaluation of new technique called STEGANOGRAPHY [1-5, 7, 9, 16, 20] which expends data hiding [14,16,17].The word steganography was adopted from Greek literature which means -covered writing‖ [2,3]. The usage of steganographic techniques dates back to prehistoric periods which refer to usage of invisible inks, text on wax-covered tablets, communicating hidden messages in music etc.…”
Section: Introductionmentioning
confidence: 99%