Image Data Compression. Introduc<on to watermarking and steganography

Size: px
Start display at page:

Download "Image Data Compression. Introduc<on to watermarking and steganography"

Transcription

1 Image Data Compression Introduc<on to watermarking and steganography 1

2 Examples and common terminology Example: watermarks (WMs) embedded in paper money ing Hidden from view (or non-obstruc<ng) in normal use Recovered via a special process (holding up to light) Contains informa<on related to object (bill authen<city) The presence of a watermark may be known to user Example: a secret wri;en with milk on top of a non-secret (cover, or decoy) le;er wri;en with ink Hidden is unrelated to the decoy leuer The presence of the hidden itself is secret (otherwise called overt embedded communica<on ) From Greek steganos = covered Steganographic communica<on ing of electronic signals: Work: a specific signal, such as an image, audio or video record (e.g., song in MP3) Content: set of all Works (e.g., all audio music) that may be WM ed Medium: means of represen<ng, transmi_ng or recording the content (e.g., a CD) Book on subject: Cover Work: original signal before modifica<on (called embedding) [Cox et al, 08] ing: impercep+bly altering a Work to embed a about that Work Steganography: undetectably altering a Work to embed a secret Steganalysis: detec<on whether secret steganographic communica<on is taking place 2

3 Categoriza8on of informa8on hiding Cover Work-dependent Cover Work-independent Existence of is hidden Covert watermarking Example: In 1981, M. Thatcher marked copies of secret documents with unique word spacing pauerns to find a cabinet minister who leaked informa<on. Steganography Example: SALT-II nuclear treaty described sensors on missile silos, repor<ng if a silo is occupied. Both USSR and USA inves<gated if sensors could transmit other informa<on. Existence of is known Overt watermarking Example: Web-sites of some museums provide high-quality digital images of the collec<on, with a warning that each image is watermarked to protect it against piracy or reproduc<on. Overt embedded communica<on Example: In late 1940s, a <me code at 800Hz frequency was embedded in radio broadcast. The code was inaudible, and only communicated the current <me to various automa<c devices. Cover Work Payload Embedder ed Work Stego Work Detector (Maybe) Detected payload 3

4 Possible uses of digital watermarking and steganography ing: Internet and high-capacity digital recording devices facilitate unauthorized copying Cryptography provides the protec<on in transit, but not aler delivery ing is a complement to cryptographic protec<on, never removed during use, may be designed to survive content transforma<ons (re-encoding, format changes, etc.) Steganography: Electronic communica<ons are suscep<ble to eavesdropping and interven<ons Security and privacy can be addressed by cryptographic tools, or by anonymous r ers However, encryp<on is not hidden, and the presence of the communica<on is obvious Steganography can be used also in cases when the encryp<on is prohibited Cryptanalysis aims to establish whether communica<on is taking place (e.g. to prevent criminal ac<vi<es or to iden<fy members of an organiza<on) Eve Alice Detect communica<on, auack the channel Covert communica<on Bob 4

5 Some specific applica8ons of digital watermarking Broadcast monitoring air <me verifica<on, re-broadcas<ng control, ads control ac<ve vs passive monitoring: index complexity reduc<on Owner iden<fica<on legal copyright no<ce, owner contact informa<on Proof of ownership key in central repository, digital nega<ve, asymmetric iden<fica<on of original / derived work Transac<on tracking (fingerprin<ng of copies) e.g. iden<fica<on of leaking party at Oscar Award previews Content authen<ca<on detec<on of tampering, localized [semi]fragile digital signature Copy / Record / Playback control e.g. DVD copy protec<on Device control copy preven<on marks, ads indicator, traffic info on FM radio Legacy enhancement digital signals transmiued over analog networks, lyrics in MP3 Desired WM properdes and characterisdcs: Impercep<bility: WM must not ruin the aesthe<cs of Cover Work Inseparability: WM cannot be removed by conver<ng, re-forma_ng, etc. Example of (rela<vely poor) watermarking as owner iden<fica<on: the complete Lena image and its (usually omiued) copyright no<ce 5

6 Quan8ta8ve metrics of watermarking systems Embedding effecdveness probability that output is iden<fied as watermarked immediately aler embedding (may be <100%) compromise between effec<veness and fidelity; determined analy<cally or with large DB of Works Fidelity how impercep<ble WM is in Work; perceptual similarity between original and watermarked Works (possibly aler addi<onal degrada<on of both due to delivery); based on some percep<ve model Robustness how well WM survives common signal processing opera<ons: spa<al / temporal filtering, lossy compression, prin<ng / scanning, geometric distor<ons etc. Data payload number of bits a watermark encodes per unit of <me or per Work; N-bit WM encodes 2 N +1 possible detector outputs (one bit always encodes very presence of WM) Blind [public] or informed [private] detecdon whether original Work is needed for successful detec<on False posidve rate probability to erroneously detect a missing WM per detector run (fixed Work, random WMs) Security ability to resist hos<le auacks, such as unauthorized removal (elimina<on, masking, collusion) / embedding (forgery) = ac<ve auacks, unauthorized detec<on = passive auack Use of secret watermark key (similar to cipher key) Cost deployment of embedders / detectors, computa<onal load, real-<me requirements etc. 6

7 Proper8es of steganographic and steganaly8c systems Recall the primary goal of steganography: conceal the fact that the covert communica<on is present within innocuous communica<on ProperDes of a WM system irrelevant for steganography: Embedding effecdveness: N/A, due to freedom to choose a suitable Cover Work Fidelity: N/A, since the steganalyzing party normally has no access to the original Work Blind / informed extracdon: N/A, one usually assumes that the original Work is not available Robustness: N/A, noise etc. not a big issue for modern digital communica<on ProperDes important for steganography: Embedding capacity: maximum theore<cally possible number of embedded bits Steganographic capacity: max payload hidden without ar<facts, so that the detec<on is improbable Embedding efficiency: number of embedded bits per unit of distor<on Robustness against system / blind / targeted steganalysis Based on method weakness (implementa<on fault, insufficient stego keyspace), sta<s<cal proper<es common to all methods, detectability of s embedded with a specific method. StaDsDcal undetectability Is it hard to no<ce the presence of a? Usually (loosely) quan<fied in terms of sta<s<cal anomalies, based on some sta<s<cal model of relevant Works. False alarm rate: tradeoffs characterized with Receiver Opera<ng Characteris<c (ROC) curves Security: resistance to passive (observa<on), ac<ve (obstruc<on), malicious (impersona<on) auacks Use of stego keys Algorithm is assumed known, embedding is controlled by a secret key. Schemes can be symmetric or asymmetric; as a rule, key length does not influence the security as much as the length of crypto keys 7

8 Small digression: communica8on systems Reminder: generic image compression + communicadon system Source Sink Remove irrelevance Remove redundancy Transform Inject missing irrelevant informa<on (based on assump<ons/models) Inverse transform Simple communicadon system: Input m TransmiUed signal: Channel encoder x Lossless coding Decoding n + x = {x 1, x 2,..., x N }, Noise Simplest channel: addi<ve white Gaussian noise, y Codec Channel Channel coding Modula<on Channel Demodula<on Error correc<on Channel decoder Inject channel-adjusted redundant informa<on (error protec<on) Exploit, remove injected redundancy Output x 2 i p i y = x + n, n ~ N( 0,σ 2 ) m n Goal: maximize likelihood that the detected is iden<cal to the original 8

9 Secure communica8on systems CommunicaDon with encrypdon: Input m Noise Channel Channel Encryptor + encoder Decryptor decoder Encryp<on key x n y Decryp<on key Output m n CommunicaDon with key-based channel coding: Input m Encoding key Channel encoder x n + Noise y Goal: secrecy of s, messaging layer. Example: RSA encryp<on Channel decoder Decoding key Output m n Goal: guaranteed delivery of signals, transport layer. Example: spread-spectrum radio 9

10 Communica8on-based models of watermarking ing with a simple informed detector: Input m embedder key encoder w a Original cover work + c o c w n + Noise c wn co detector + - wn Original cover work decoder key Output m n Message mapped to added pa4ern w a (could be via intermediate pa4ern w m ) w a is added to cover work w o to produce watermarked work c w (i.e. blind embedder: ignores proper<es of cover work) Further processing adds noise n (could be more complex: compression, auacks etc.) If original work is subtracted, then the communica<on process is iden<cal to simple communica<on model with addi<ve noise 10

11 Communica8on-based models of watermarking ing with a blind detector: Input m embedder key encoder w a Original cover work + c o c w n + Noise c wn detector decoder key Output m n In blind detector, cover work is just another kind of noise One goal: maximize similarity between the input and output s Another possible goal: learn how exactly watermarked work was processed 11

12 Simple WM system: blind embedding, correla8on detector Embed 1-bit m: c = co + α ( 2m 1) wr m=1 m=0 +α ( 2m 1) cover work = reference pauern Detect via linear correladon (scalar product): 1 1 zlc (c, wr ) = c wr = c[x, y] wr [x, y] N N x,y Effect from noise: c = co ± α wr + n, zlc (c, wr ) = zlc (co, wr ) + zlc (n, wr ) ± α zlc (wr, wr ) If reference pauern has zero mean, unit variance, then: " 1, zlc (c, wr ) > τ $$ mn = # no, zlc (c, wr ) < τ $ 0, z ( c, wr ) < τ $% lc 12

13 Tes8ng simple WM system with DB of images Percentage of images [Cox et al, 08] m = 0 No WM m =1 Plausible threshold value DB of 4000 images Strength α = 1 Threshold τ = 0.7 results in false posi<ve probability of ~ 10-4 Performance highly dependent on reference image E.g. low-pass filtering results in much poorer separa<on, higher FP probability Detec<on value (linear correla<on) Working and useful WM system; however, only op<mal if the cover work and noise are drawn from Gaussian distribu<on, suscep<ble to certain auacks 13

14 ing as communica8on with side informa8on Idea: allow embedder to examine cover work before genera<ng watermark Input m embedder key encoder w a Original cover work + c o Can even subtract cover work completely c w n + Noise c wn detector decoder key [Shannon, 58]: communica<on with side informa<on at the transmiuer Can modify embedder to guarantee 100% embedding efficiency (losing in fidelity) Output m n 14

15 Fixed correla8on embedding c = c o +α 2m 1 ( ) w r, Percentage of images α = τ goal z lc ( c o, w r ) z lc ( w r, w r ) m = 0 m =1 No WM Detec<on value (linear correla<on) 15

16 Geometric models of watermarking Media space: mul<-dimensional space of all works Region of acceptable fidelity D( c, c o ) < δ c o Detec<on region z lc ( c, w r ) > τ Fidelity distance func<on extremely difficult to formalize; depends on human percep<on. Simplest case - MSE: D MSE ( c 1, c 2 ) = 1 N = 1 N x,y c 1 c 2 2 ( c 1 [x, y] c 2 [x, y] ) 2 Successfully watermarked versions of c o Some perceptual distance func<ons are asymmetric, result in units of JND just no<ceable difference w r True distribu<on of works in media space is usually unknown, effect of transmission / noise / auacks also unknown J (but modeled anyway) 16

17 Effects of blind and fixed-correla8on embedding Blind embedder w r Fixed-lc embedder w r AlternaDve common detecdon region definidons: Normalized correla<on: angle in N-dim space z nc ( c, w r ) = c w r c w r = cos ( c, w r ) Correla<on coefficient: subtract mean first (= angle between N-1-dimensional projec<ons) z cc ( c, w r ) = z nc ( c c, w r w r ) Plane x = x[i] = 0 w r w r c Detec<on region Projec<ons on plane Detec<on region 17

18 Marking space (cf. transform-based compression) Media space (e.g. pixel values) not always convenient for watermarking Extractor transforms work to more convenient representa<on (e.g. frequencies, wavelets) Unlike image compression, not looking for more compact representa<on Generic watermark embedder Original cover work Vector in media space extractor Message Simple WM Vector in embedded marking space Inverse extractor ed work Vector in media space Generic watermark detector Input work Vector in extractor media space Simple WM Vector in detector marking space Detected 18

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Basic concepts of Digital Watermarking. Prof. Mehul S Raval Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

Dynamic Collage Steganography on Images

Dynamic Collage Steganography on Images ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to

More information

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image EUROPEAN ACADEMIC RESEARCH Vol. III, Issue 1/ April 2015 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Image Compression and Decompression Technique Based on Block

More information

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW

More information

European Associa.on for Biometrics

European Associa.on for Biometrics European Associa.on for Biometrics Preliminary Contribu.on to Horizon 2020 Consulta.ons on Trustworthy ICT Edited by: Farzin Deravi, University of Kent, EAB Training & Educa>on CommiAee Chair Raymond Veldhuis,

More information

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret

More information

Information Hiding: Steganography & Steganalysis

Information Hiding: Steganography & Steganalysis Information Hiding: Steganography & Steganalysis 1 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant

More information

Analysis of Informa.on - III

Analysis of Informa.on - III Analysis of Informa.on - III Efficiency of Graphic The efficiency of a graphic is determined as: To obtain a correct and complete answer to a given ques.on, all other things being equal, one graphic requires

More information

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE www.technicalpapers.co.nr ABSTRACT : Steganography is the process of hiding secret information in a cover image. Our aim is to test a set

More information

A New Steganographic Method for Palette-Based Images

A New Steganographic Method for Palette-Based Images A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique

More information

Colored Digital Image Watermarking using the Wavelet Technique

Colored Digital Image Watermarking using the Wavelet Technique American Journal of Applied Sciences 4 (9): 658-662, 2007 ISSN 1546-9239 2007 Science Publications Corresponding Author: Colored Digital Image Watermarking using the Wavelet Technique 1 Mohammed F. Al-Hunaity,

More information

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE 1 Ram Krishna Jha, 2 Ravi Kumar Mishra 1 Dept. of Information Technology, G L Bajaj Institute of Technology

More information

Steganography using LSB bit Substitution for data hiding

Steganography using LSB bit Substitution for data hiding ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication

More information

Keywords Secret data, Host data, DWT, LSB substitution.

Keywords Secret data, Host data, DWT, LSB substitution. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

LSB Encoding. Technical Paper by Mark David Gan

LSB Encoding. Technical Paper by Mark David Gan Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

Different Steganography Methods and Performance Analysis

Different Steganography Methods and Performance Analysis International Journal of Engineering Inventions ISSN: 2278-7461, ISBN: 2319-6491 Volume 2, Issue 1 (January 2013) PP: 37-45 Different Steganography Methods and Performance Analysis Shantala.C.P 1, K.V

More information

Performance Improving LSB Audio Steganography Technique

Performance Improving LSB Audio Steganography Technique ISSN: 2321-7782 (Online) Volume 1, Issue 4, September 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Performance

More information

An Improvement for Hiding Data in Audio Using Echo Modulation

An Improvement for Hiding Data in Audio Using Echo Modulation An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents

More information

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

ScienceDirect. A Novel DWT based Image Securing Method using Steganography Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based

More information

A Study on Image Steganography Approaches in Digital Images

A Study on Image Steganography Approaches in Digital Images A Study on Image Steganography Approaches in Digital Images R.M. Yadav 1, Dr. Deepak Singh Tomar 2, Dr. R.K. Baghel 3 Department of CSE&IT, ECE, MANIT, Bhopal, M.P., India rmyyadav@rediffmail.com 1, deepaktomarmanit@gmail.com

More information

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY Cell, Manjari Road,Hadapsar,Pune-412307. India,Chief Editor:Dr.K.R.Harne,Editors:Prof R V Patil,Prof Niraja Jain ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY AbhishekShinde,

More information

Transform Domain Technique in Image Steganography for Hiding Secret Information

Transform Domain Technique in Image Steganography for Hiding Secret Information Transform Domain Technique in Image Steganography for Hiding Secret Information Manibharathi. N 1 (PG Scholar) Dr.Pauls Engg. College Villupuram Dist, Tamilnadu, India- 605109 Krishnaprasad. S 2 (PG Scholar)

More information

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2

More information

Data Hiding In Audio Signals

Data Hiding In Audio Signals Data Hiding In Audio Signals Deepak garg 1, Vikas sharma 2 Student, Dept. Of ECE, GGGI,Dinarpur,Ambala Haryana,India 1 Assistant professor,dept.of ECE, GGGI,Dinarpur,Ambala Haryana,India 2 ABSTRACT Information

More information

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques Aniketkulkarni Sheela.c DhirajDeshpande M.Tech, TOCE Asst.Prof, TOCE Asst.prof,BKIT aniketoxc@gmail.com

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

Comparative study of digital audio steganography techniques

Comparative study of digital audio steganography techniques Djebbar et al. EURASIP Journal on Audio, Speech, and Music Processing 2012, 2012:25 REVIEW Open Access Comparative study of digital audio steganography techniques Fatiha Djebbar 1*, Beghdad Ayad 2, Karim

More information

Concealing Data for Secure Transmission and Storage

Concealing Data for Secure Transmission and Storage Concealing Data for Secure Transmission and Storage Abirami.P1, Shanmugam.M2 1Department of Civil Engineering, Institute of Remote Sensing, Anna University, Chennai, India 2Scientist, Institute of Remote

More information

A New Image Steganography Depending On Reference & LSB

A New Image Steganography Depending On Reference & LSB A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of

More information

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005 Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.

More information

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique Secure Steganography using N-Queen Puzzle and its Comparison with LSB Technique Akashdeep Singh Sandeep Kaur Dhanda Rupinder Kaur Abstract- Steganography is the art of concealing the existence of information

More information

Mobile and Ubiquitous Compu3ng. Wireless Signals. George Roussos.

Mobile and Ubiquitous Compu3ng. Wireless Signals. George Roussos. Mobile and Ubiquitous Compu3ng Wireless Signals George Roussos g.roussos@dcs.bbk.ac.uk Overview Signal characteris3cs Represen3ng digital informa3on with wireless Transmission and propaga3on Accessing

More information

CloudSense. Con%nuous Fine- Grain Cloud Monitoring with Compressive Sensing. H. T. Kung, Chit- Kwan Lin, Dario Vlah

CloudSense. Con%nuous Fine- Grain Cloud Monitoring with Compressive Sensing. H. T. Kung, Chit- Kwan Lin, Dario Vlah CloudSense Con%nuous Fine- Grain Cloud Monitoring with Compressive Sensing H. T. Kung, Chit- Kwan Lin, Dario Vlah Monitoring and Performance Cloud monitoring and performance can be in%mately related Finer-

More information

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit

More information

Power Allocation Tradeoffs in Multicarrier Authentication Systems

Power Allocation Tradeoffs in Multicarrier Authentication Systems Power Allocation Tradeoffs in Multicarrier Authentication Systems Paul L. Yu, John S. Baras, and Brian M. Sadler Abstract Physical layer authentication techniques exploit signal characteristics to identify

More information

Comparative Analysis of Hybrid Algorithms in Information Hiding

Comparative Analysis of Hybrid Algorithms in Information Hiding Comparative Analysis of Hybrid Algorithms in Information Hiding Mrs. S. Guneswari Research Scholar PG & Research Department of Computer Science Sudharsan College of Arts & Science Pudukkottai 622 10 Tamilnadu,

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India

More information

Secure Spread Spectrum Data Embedding and Extraction

Secure Spread Spectrum Data Embedding and Extraction Secure Spread Spectrum Data Embedding and Extraction Vaibhav Dhore 1, Pathan Md. Arfat 2 1 Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, University of Pune, India 2

More information

A Proposed Technique For Hiding Data Into Video Files

A Proposed Technique For Hiding Data Into Video Files www.ijcsi.org 68 A Proposed Technique For Hiding Data Into Video Files Mohamed Elbayoumy 1, Mohammed Elmogy 2, Ahmed Abouelfetouh 3 and Rasha Elhadary 4 1 Information systems department, Faculty of computer

More information

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,

More information

Investigation of Various Image Steganography Techniques in Spatial Domain

Investigation of Various Image Steganography Techniques in Spatial Domain Volume 3, Issue 6, June-2016, pp. 347-351 ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Investigation of Various Image Steganography

More information

Bitmap Steganography:

Bitmap Steganography: Steganography: An Introduction Beau Grantham 2007 04 13 COT 4810: Topics in Computer Science Dr. Dutton I. Introduction Steganography is defined as the art and science of communicating in a way which hides

More information

Image Compression Supported By Encryption Using Unitary Transform

Image Compression Supported By Encryption Using Unitary Transform Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant

More information

Space Environment Impacts on Geosta2onary Communica2ons Satellites

Space Environment Impacts on Geosta2onary Communica2ons Satellites Space Environment Impacts on Geosta2onary Communica2ons Satellites Thesis Proposal Defense Whitney Q. Lohmeyer Commi@ee Chair: Kerri Cahoy May 6, 2013 Military COMSAT aler Environmental Tes2ng [1] 2 Problem

More information

Introduction to Audio Watermarking Schemes

Introduction to Audio Watermarking Schemes Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia

More information

Principle and applications of BPCS-Steganography

Principle and applications of BPCS-Steganography header for SPIE use BPCS-Steganography Experimental Program site: http://www.datahide.com/bpcse/qtechhv-program-e.html Principle and applications of BPCS-Steganography Eiji Kawaguchi* and Richard O. Eason**

More information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means

More information

Hiding Image in Image by Five Modulus Method for Image Steganography

Hiding Image in Image by Five Modulus Method for Image Steganography Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another

More information

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Steganalytic methods for the detection of histogram shifting data-hiding schemes Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques

More information

A Comprehensive Review on Secure Image Steganography

A Comprehensive Review on Secure Image Steganography 25 A Comprehensive Review on Secure Image Steganography Yadavindra College of Engineering, Punjabi University, Patiala kritikasingla23@gmail.com, Purbasumeet@yahoo.co.in Abstract: Steganography is an art

More information

Improved Detection of LSB Steganography in Grayscale Images

Improved Detection of LSB Steganography in Grayscale Images Improved Detection of LSB Steganography in Grayscale Images Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow at Oxford University Computing Laboratory Information Hiding Workshop

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST 2005 727 On the Use of Masking Models for Image and Audio Watermarking Arnaud Robert and Justin Picard Abstract In most watermarking systems, masking

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

Content. Chapter 6 PASSBAND DATA TRANSMISSION. Dr. Samir Alghadhban 11/22/13

Content. Chapter 6 PASSBAND DATA TRANSMISSION. Dr. Samir Alghadhban 11/22/13 Chapter 6 PASSBAND DATA TRANSMISSION Dr. Samir Alghadhban 1 Content Different methods of digital modula3on, namely, phase- shi8 keying, quadrature- amplitude modula3on, and frequency- shi8 keying, and

More information

Compendium of Reversible Data Hiding

Compendium of Reversible Data Hiding Compendium of Reversible Data Hiding S.Bhavani 1 and B.Ravi teja 2 Gudlavalleru Engineering College Abstract- In any communication, security is the most important issue in today s world. Lots of data security

More information

Lecture 7: Op,cal Design. Christoph U. Keller

Lecture 7: Op,cal Design. Christoph U. Keller Lecture 7: Op,cal Design Christoph U. Keller Overview 1. Introduc5on 2. Requirements Defini5on 3. Op5cal Design Principles 4. Ray- Tracing and Design Analysis 5. Op5miza5on: Merit Func5on 6. Tolerance

More information

Secret Communication on Facebook Using Image Steganography: Experimental Study

Secret Communication on Facebook Using Image Steganography: Experimental Study Secret Communication on Facebook Using Image Steganography: Experimental Study Budoor S. Edhah Department of Information Systems King Abdulaziz University, Saudi Arabia beidhah@stu.kau.edu.sa Daniyal M.

More information

Experimental Validation for Hiding Data Using Audio Watermarking

Experimental Validation for Hiding Data Using Audio Watermarking Australian Journal of Basic and Applied Sciences, 5(7): 135-145, 2011 ISSN 1991-8178 Experimental Validation for Hiding Data Using Audio Watermarking 1 Mamoun Suleiman Al Rababaa, 2 Ahmad Khader Haboush,

More information

Visual Secret Sharing Based Digital Image Watermarking

Visual Secret Sharing Based Digital Image Watermarking www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,

More information

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2 A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2 1 PG Scholar, Department of ECE, Adiyamaan college of Engineering,Hosur, Tamilnadu, India

More information

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform

More information

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Surbhi Gupta 1, Parvinder S. Sandhu 2 Abstract Steganography means covered writing. It is the concealment of information

More information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,

More information

A Study on Steganography to Hide Secret Message inside an Image

A Study on Steganography to Hide Secret Message inside an Image A Study on Steganography to Hide Secret Message inside an Image D. Seetha 1, Dr.P.Eswaran 2 1 Research Scholar, School of Computer Science and Engineering, 2 Assistant Professor, School of Computer Science

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION SHAOHUI LIU, HONGXUN YAO, XIAOPENG FAN,WEN GAO Vilab, Computer College, Harbin Institute of Technology, Harbin, China, 150001

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking

More information

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT) IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar Apr. 2015), PP 32-44 www.iosrjournals.org Audio Steganography Using Discrete Wavelet

More information

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The

More information

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing ABSTRACT Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information

More information

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE Rajkumar Yadav 1, Ravi Saini 2 and Kamaldeep 3 1 U.I.E.T, Maharshi Dayanand University, Rohtak-124001, Haryana,

More information

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis T. R. Gopalakrishnan Nair# 1, Suma V #2, Manas S #3 1,2 Research and Industry Incubation Center, Dayananda

More information

An Integrated Image Steganography System. with Improved Image Quality

An Integrated Image Steganography System. with Improved Image Quality Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality

More information

Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks

Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks Ratnesh Kumbhkar, Gokul Sridharan, Narayan B. Mandayam, Ivan Seskar (, Rutgers, The State University of New Jersey) and

More information

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 40-44 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Data Security Using Visual Cryptography

More information

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING

More information

Audio watermarking using transformation techniques

Audio watermarking using transformation techniques Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Audio watermarking using transformation techniques Rajkiran Ravula Louisiana State University and Agricultural and

More information

Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems. Brian Chen

Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems. Brian Chen Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems by Brian Chen B.S.E., University of Michigan (1994) S.M., Massachusetts Institute of Technology (1996) Submitted

More information

Medical Image Watermarking using a Perceptual Similarity Metric

Medical Image Watermarking using a Perceptual Similarity Metric MIT International Journal Electrical and Instrumentation Engineering Vol. 1, No. 1, Jan. 2011, pp. 29-34 29 Medical Image Watermarking using a Perceptual Similarity Metric Janani Natarajan Engineering

More information

NHSC/PACS Webinar PACS Point Source Photometry. Aperture Photometry and Photometric Uncertain5es. Roberta Paladini NHSC PACS.

NHSC/PACS Webinar PACS Point Source Photometry. Aperture Photometry and Photometric Uncertain5es. Roberta Paladini NHSC PACS. NHSC/PACS Webinar PACS Point Source Photometry Aperture Photometry and Photometric Uncertain5es Roberta Paladini July 2012 1 Content I Point- source aperture photometry in HIPE II Calibra=on errors III

More information

ISeCure. The ISC Int'l Journal of Information Security. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications

ISeCure. The ISC Int'l Journal of Information Security. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications The ISC Int'l Journal of Information Security January 2013, Volume 5, Number 1 (pp. 5 36) http://www.isecure-journal.org Invited Paper A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and

More information

Audio Watermark Detection Improvement by Using Noise Modelling

Audio Watermark Detection Improvement by Using Noise Modelling Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,

More information

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

A High-Rate Data Hiding Technique for Uncompressed Audio Signals A High-Rate Data Hiding Technique for Uncompressed Audio Signals JONATHAN PINEL, LAURENT GIRIN, AND (Jonathan.Pinel@gipsa-lab.grenoble-inp.fr) (Laurent.Girin@gipsa-lab.grenoble-inp.fr) CLÉO BARAS (Cleo.Baras@gipsa-lab.grenoble-inp.fr)

More information