Biomedical Engineering Reference
In-Depth Information
JPEG and Video file that the employee sends reach the destinations within no time
in a JPEG and Video file format where the end user needs to de-embed the file,
decrypt it, and use for the purpose.
Features and Applications
Data-hiding techniques [ 8 , 9 , 10 ] should be capable of embedding data in a host
signal with the following restrictions and features:
1. The host signal should be nonobjectionably degraded and the embedded data
should be minimally perceptible (The goal is for the data to remain hidden. As
any magician will tell you, it is possible for something to be hidden while it
remains in plain sight; you merely keep the person from looking at it. We will
use the words hidden, inaudible, unperceivable, and invisible to mean that an
observer does not notice the presence of the data, even if they are perceptible).
2. The embedded data should be directly encoded into the media, rather than into
a header or wrapper, so that the data remain intact across varying data file
formats.
3. The embedded data should be immune to modifications ranging from inten-
tional and intelligent attempts at removal to anticipated manipulations, e.g.,
channel noise, filtering, resembling, cropping, encoding, lossy compressing,
printing and scanning, digital-to-analog (D/A) conversion, and analog- to-
digital (A/D) conversion, etc.
4. Asymmetrical coding of the embedded data is desirable, since the purpose of
data hiding is to keep the data in the host signal, but not necessarily to make the
data difficult to access.
5. Error correction coding 1 should be used to ensure data integrity. It is inevitable
that there will be some degradation to the embedded data when the host signal
is modified.
6. The embedded data should be self-clocking or arbitrarily re-entrant. This
ensures that the embedded data can be recovered when only fragments of the
host signal are available, e.g., if a sound bite is extracted from an interview,
data embedded in the audio segment can be recovered. This feature also
facilitates automatic decoding of the hidden data, since there is no need to refer
to the original host signal.
Applications
Tradeoffs exists between the quantity of embedded data and the degree of
immunity to host signal modification. By constraining the degree of host signal
degradation, a data-hiding method can operate with either high embedded data
Search WWH ::




Custom Search