Introduction to data compression
Introduction to data compression
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Invertible Authentication Watermark for JPEG Images
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Reversible watermarking of 2D-vector data
Proceedings of the 2004 workshop on Multimedia and security
Counterfeiting attack on a lossless authentication watermarking scheme
VIP '02 Selected papers from the 2002 Pan-Sydney workshop on Visualisation - Volume 22
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing
Lossless data embedding: new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing
Methods for image authentication: a survey
Multimedia Tools and Applications
Data hiding method using image interpolation
Computer Standards & Interfaces
Reversible Watermarking with Subliminal Channel
Information Hiding
An Improved Reversible Difference Expansion Watermarking Algorithm
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Reversible watermarking algorithm using sorting and prediction
IEEE Transactions on Circuits and Systems for Video Technology
A Reversible Watermarking Scheme for 3D Meshes
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Biometric Based Unique Key Generation for Authentic Audio Watermarking
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Preserve robustness for image data hiding
ISPRA'10 Proceedings of the 9th WSEAS international conference on Signal processing, robotics and automation
Data hiding based on the similarity between neighboring pixels with reversibility
Digital Signal Processing
A reversible acoustic steganography for integrity verification
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Reversible watermarking based on invariant relation of three pixels
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part III
Video data hiding for managing privacy information in surveillance systems
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Reversible data hiding for image based on histogram modification of wavelet coefficients
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Invertible watermarking scheme for authentication and integrity
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Lossless data hiding based on histogram modification of difference images
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Reversible semi-fragile image authentication using zernike moments and integer wavelet transform
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Analysis and comparison of typical reversible watermarking methods
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Lossless data hiding for high embedding capacity
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
High capacity lossless data hiding
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A Markov-based reversible data hiding method based on histogram shifting
Journal of Visual Communication and Image Representation
Secure transmission of authenticated messages using new encoding scheme and Steganography
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Journal of Systems and Software
Hi-index | 0.00 |
One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted by some small amount of noise due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255. Although the distortion is often quite small, it may not be acceptable for medical imagery (for legal reasons) or for military images inspected under unusual viewing conditions (after filtering or extreme zoom). In this paper, we introduce a general approach for high-capacity data embedding that is distortion-free (or lossless) in the sense that after the embedded information is extracted from the stego-image, we can revert to the exact copy of the original image before the embedding occurred. The new method can be used as a powerful tool to achieve a variety of non-trivial tasks, including distortion-free robust watermarking, distortion-free authentication using fragile watermarks, and steganalysis. The proposed concepts are also extended to lossy image formats, such as the JPG.