Frequency-domain data hiding based on the Matryoshka principle
International Journal of Advanced Media and Communication
Self-synchronizing robust texel watermarking in gaussian scale-space
Proceedings of the 10th ACM workshop on Multimedia and security
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
Information Security and Cryptology
True color image steganography using palette and minimum spanning tree
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
Content-Adaptive Robust Image Watermarking with Posterior HMM-Based Detector
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Robust multiplicative patchwork method for audio watermarking
IEEE Transactions on Audio, Speech, and Language Processing
IEEE Transactions on Information Forensics and Security
Optimal spread spectrum watermark embedding via a multistep feasibility formulation
IEEE Transactions on Image Processing
Block Based Video Data Hiding Using Repeat Accumulate Codes and Forbidden Zone Data Hiding
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Robust multiplicative patchwork method for audio watermarking
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Design of secure watermarking scheme for watermarking protocol
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Soft feature-based watermark decoding with insertion/deletion correction
IH'07 Proceedings of the 9th international conference on Information hiding
Data hiding based on the similarity between neighboring pixels with reversibility
Digital Signal Processing
Robust image data hiding using geometric mean quantization
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Robust multiplicative audio and speech watermarking using statistical modeling
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Contourlet-based image watermarking using optimum detector in a noisy environment
IEEE Transactions on Image Processing
IEEE Transactions on Information Forensics and Security
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Multimedia Tools and Applications
Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation
Digital Signal Processing
A novel color palette image authentication scheme
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Robust and secured image-adaptive data hiding
Digital Signal Processing
Increasing image compression rate using steganography
Expert Systems with Applications: An International Journal
Hi-index | 0.02 |
Information-theoretic analyses for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. We propose practical realizations of this prescription for data hiding in images, with a view to hiding large volumes of data with low perceptual degradation. The hidden data can be recovered reliably under attacks, such as compression and limited amounts of image tampering and image resizing. The three main findings are as follows. 1) In order to limit perceivable distortion while hiding large amounts of data, hiding schemes must use image-adaptive criteria in addition to statistical criteria based on information theory. 2) The use of local criteria to choose where to hide data can potentially cause desynchronization of the encoder and decoder. This synchronization problem is solved by the use of powerful, but simple-to-implement, erasures and errors correcting codes, which also provide robustness against a variety of attacks. 3) For simplicity, scalar quantization-based hiding is employed, even though information-theoretic guidelines prescribe vector quantization-based methods. However, an information-theoretic analysis for an idealized model is provided to show that scalar quantization-based hiding incurs approximately only a 2-dB penalty in terms of resilience to attack.