A Feature Calibration Method For Watermarking Of Document Images
ICDAR '99 Proceedings of the Fifth International Conference on Document Analysis and Recognition
OCB: A block-cipher mode of operation for efficient authenticated encryption
ACM Transactions on Information and System Security (TISSEC)
A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Watermarking text document images using edge direction histograms
Pattern Recognition Letters
Component-based digital watermarking of Chinese texts
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Interword distance changes represented by sine waves for watermarking text images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Steganography, or covert communication between two parties through public channels, has been received a lot of attention, since the mere existence of encrypted message might cause suspicion and could even provide useful information to eavesdroppers. In some cases, secret information needs to be covertly broadcast to receivers in multiple locations at the same time. In this paper, we propose a novel steganographic scheme, which covertly sends secret message to multiple receivers via a stream of running short text messages displayed on a media output screen, assuming appropriate optical character recognition (OCR) functionality at the decoder. We use Thai language short text messages as a case study. We analyze the characteristics of Thai short text messages and introduce some effective message-to-bit transformation methods. We find that one Thai short text message can be transformed into multiple secret bits. In principle, the proposed transformation methods can be applied to short text messages in any language. We use a provably secure construction that guarantees covertness, privacy, and authenticity of the secret data against active attacks. In an experimental evaluation, we show that four secret message bits can be embedded in each short text message. In addition, we find that the embedded bits can be retrieved correctly and easily by human observers without OCR functionality at the decoder. Thus, the scheme is practical and effective for covert communication from one sender to multiple receivers over public channels.