Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.
Cited By
- Alsultan J A Triple-Bit Coding Scheme for Digital Image Watermarking Proceedings of the 2019 International Conference on Intelligent Medicine and Image Processing, (53-57)
- Darvish Rouhani B, Chen H and Koushanfar F DeepSigns Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, (485-497)
- Liu H, Liu J, Yan X, Liu L, Ding W and Jiang Y (2020). A Novel Behavior Steganography Model Based on Secret Sharing, International Journal of Digital Crime and Forensics, 11:4, (97-117), Online publication date: 1-Oct-2019.
- Dalal M and Juneja M (2019). A robust and imperceptible steganography technique for SD and HD videos, Multimedia Tools and Applications, 78:5, (5769-5789), Online publication date: 1-Mar-2019.
- Weng X, Li Y, Chi L and Mu Y High-Capacity Convolutional Video Steganography with Temporal Residual Modeling Proceedings of the 2019 on International Conference on Multimedia Retrieval, (87-95)
- Pérez Gort M, Feregrino Uribe C and Nummenmaa J A Minimum Distortion Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, (111-121)
- Behloul A A blind robust image watermarking using interest points and IWT Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, (139-145)
- Grusho A, Grusho N and Timonina E Problems of modeling in the analysis of covert channels Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security, (118-124)
- Kim Y, Duric Z and Richards D Towards lower bounds on embedding distortion in information hiding Proceedings of the 5th international conference on Digital Watermarking, (362-376)
- Duric Z, Richards D and Kim Y Minimizing the statistical impact of LSB steganography Proceedings of the Second international conference on Image Analysis and Recognition, (1175-1183)
- Davidson I and Paul G Locating secret messages in images Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (545-550)
- Sion R, Atallah M and Prabhakar S On watermarking numeric sets Proceedings of the 1st international conference on Digital watermarking, (130-146)
Recommendations
Hiding clinical information in medical images
Display Omitted Implementation and successful usage of Pixel to Block conversion technique (PTB) for high capacity.Computationally efficient mechanism for generating cover image from input image.Block checksum computation and it's use for tamper ...
Hiding Information Employing Reduplicating Embedding
APSCC '08: Proceedings of the 2008 IEEE Asia-Pacific Services Computing ConferenceIn this paper, a novel data hiding method employing reduplicating embedding is proposed. This method uses seven most significant bits to embed two secret digits and sets the least significant bit as an indicator. Therefore, two secret digits can be ...