Applications for data hiding

  • Authors:
  • W. Bender;W. Butera;D. Gruhl;R. Hwang;F. J. Paiz;S. Pogreb

  • Affiliations:
  • MIT Media Laboratory, 20 Ames Street, Cambridge, Massachusetts;MIT Media Laboratory, 20 Ames Street, Cambridge, Massachusetts;IBM Research Division, Almaden Research Center, 650 Harry Road, San Jose, California;Harvard Medical School, 25 Shattuck Street, Boston, Massachusetts;There, 165 Jefferson Drive, Menlo Park, California;MIT Media Laboratory, 20 Ames Street, Cambridge, Massachusetts

  • Venue:
  • IBM Systems Journal
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of information tagging. As a framework for illustrating these concepts, multiple-bit and midlevel image-representation information-hiding techniques are described. A range of applications, including anticounterfeiting and authentication, is explored.