Information Technology Reference
In-Depth Information
For the empirical study we have used our own software by use of Visual C++
software development environment. In the developed software, embedding and recov-
ery can be equipped with passwords and secret keys to seed blocks thus providing
restricted access to the hidden data. There exist several additional attributes (as indi-
cated in the end of Section 3 ) facilitating further increase of security assurance of the
hidden information.
The approach can also be used for various applications like watermarking, etc. that
were also the subjects of empirical study.
The future works include developments of new SVD-based techniques for hiding
information in digital images and application of the approach to mobile hidden com-
munications.
References
1. Anderson, R., Petitcolas, F.: On the Limits of Steganography. In: IEEE Journal of Selected
Areas of Communications, Vol. 16( 4 ) (1998) 474-481
2. Andrews, H.C., Patterson, C.L.: Singular Value Decomposition (SVD) for Image Coding.
In: IEEE Transaction on Communication. Vol. 24 (1976) 425-432
3. Bender, W., Gruhl, D., Morimoto, N., and Lu, A.: Techniques for Data Hiding. In: IBM
System Journal, Vol. 35 ( 3&4 ) (1996)
4. Bruyndonckx, O., Quisquater, J.J., and Macq, B.: Spatial Method for Copyright Labeling of
Digital Images. In: Proceedings of IEEE Workshop on nonlinear signal and image Process-
ing, Greece (1995)
5. Burget, S., Koch, E., and Zhao, J.: A Novel Method for Copyright Labeling Digitized Im-
age Data. Technical Report, Fraunhofer Institute for Computer Graphics, Germany (1994)
6. Chen B., and Wornell, G.W.: Dither Modulation: A new Approach to Digital Watermark-
ing and Information Embedding. In: Ping Wah Wong and E.J.Delp (eds). Vol. 3657, San
Jose, CA, USA (1999)
7. Cox, I. and Miller, M.: A Review on Watermarking and the Importance of Perceptual Mod-
eling. In: Proceedings of the Conference on Electronic Imaging (1997)
8. Cox, I., Bloom, J., Miller, M.: Digital Watermarking: Principles & Practice. Morgan Kauf-
mann (2001)
9. Gorodetski, V., Skormin, V., Popyack, L.: SVD approach to Digital Image Lossy Compres-
sion. In: Proceedings of the 4-th Conference "Systems, Cybernetics and Informatics-2000"
(SCI-2000), USA (2000)
10. Gorodetski, V., Skormin, V., Popyack, L., Samoilov, V.: SVD-based Approach to Trans-
parent Embedding Data into Digital Images. In: Proceedings of the Workshop "Mathemati-
cal Methods, Models and Architectures for Computer Network Security". LNCS, vol. 2052,
Springer Verlag (2001) 263-274
11. Horn, R.A. and Johnson, C.R.: Matrix Analysis. Cambridge University Press (1988)
12. Johnson, N., Jagodia, S.: Exploring Steganography: Seeing the Unseen. Computer, Febru-
ary (1998) 26-34
13. Johnson, N., Duric, Z., Jajodia, S.: Information Hiding. Steganography and Watermarking-
Attacks and Countermeasures. Kluwer Academic Pub. (2000)
14. Katzenbeisser, S., Petitcolas F.A.P. (eds): Information Hiding Techniques for Staganogra-
phy and Digital Watermarking. Artech House Books (2000)
15. Kundur, D. and Hatzinakos, D.: A robust Digital Watermarking Method using Wavelet-
based Fusion. In: Proceedings of the International Conference on Image Processing, Vol. 1,
USA, IEEE (1997)
16. Machado, R.: EZ Stego. http://www.stego.com
Search WWH ::




Custom Search