2004
DOI: 10.1109/tip.2004.837557
|View full text |Cite
|
Sign up to set email alerts
|

Robust Image-Adaptive Data Hiding Using Erasure and Error Correction

Abstract: Information-theoretic analyses for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. In this paper, we propose practical realizations of this prescription for data hiding in images, with a view to hiding large volumes of data with low perceptual degradation. The hidden data can be recovered reliably under attacks, such as compression and limited amounts of image tampering and image resizing. The three main findings are as follows. 1) In order to limit perceivable dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0
3

Year Published

2007
2007
2011
2011

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 126 publications
(75 citation statements)
references
References 27 publications
0
72
0
3
Order By: Relevance
“…One issue with hiding data in random locations is the possibility of encountering errors in the hidden bits due to the fact that the stego image must be shipped or advertised in a standard format such as JPEG. This is dealt with by the use of erasures and error correction coding framework previously employed in [18]. In the next section, we describe yet another steganographic scheme (YASS), a JPEG stegosystem based on the aforementioned framework.…”
Section: The Proposed Approach For Steganographymentioning
confidence: 99%
See 3 more Smart Citations
“…One issue with hiding data in random locations is the possibility of encountering errors in the hidden bits due to the fact that the stego image must be shipped or advertised in a standard format such as JPEG. This is dealt with by the use of erasures and error correction coding framework previously employed in [18]. In the next section, we describe yet another steganographic scheme (YASS), a JPEG stegosystem based on the aforementioned framework.…”
Section: The Proposed Approach For Steganographymentioning
confidence: 99%
“…Data is hidden in a predetermined band of low frequency AC coefficients using quantization index modulation. For maintaining perceptual transparency, we do not hide in coefficients that quantize to zero by the JPEG quantizer (following the selective embedding in coefficients scheme proposed in [18]). …”
Section: Yass For Jpeg Steganographymentioning
confidence: 99%
See 2 more Smart Citations
“…The use of perceptual shaping in data hiding improves performance in terms of lower perceptual distortion for fixed payload and robustness [2], [3]. This performance is due to the incorporation of how the human visual system processes visual stimuli by exploiting the image statistics.…”
Section: Introductionmentioning
confidence: 99%