A revised taxonomy of steganography embedding patterns

S Wendzel, L Caviglione, W Mazurczyk… - Proceedings of the 16th …, 2021 - dl.acm.org
Steganography embraces several hiding techniques which spawn across multiple domains.
However, the related terminology is not unified among the different domains, such as digital …

An information-theoretic model for steganography

C Cachin - International Workshop on Information Hiding, 1998 - Springer
An information-theoretic model for steganography with passive adversaries is proposed. The
adversary's task of distinguishing between an innocent cover message C and a modified …

[图书][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …

Spread spectrum image steganography

LM Marvel, CG Boncelet… - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
We present a new method of digital steganography, entitled spread spectrum image
steganography (SSIS). Steganography, which means" covered writing" in Greek, is the …

Robust audio watermarking in the time domain

P Bassia, I Pitas, N Nikolaidis - IEEE Transactions on …, 2001 - ieeexplore.ieee.org
The audio watermarking method proposed in this paper offers copyright protection to an
audio signal by time domain processing. The strength of audio signal modifications is limited …

Software watermarking: Models and dynamic embeddings

C Collberg, C Thomborson - Proceedings of the 26th ACM SIGPLAN …, 1999 - dl.acm.org
Watermarking embeds a secret message into a cover message. In media watermarking the
secret is usually a copyright notice and the cover a digital image. Watermarking an object …

[PDF][PDF] Data hiding in audio signal: A review

P Dutta, D Bhattacharyya, T Kim - International journal of database …, 2009 - academia.edu
Abstract Information hiding technique is a new kind of secret communication technology.
The majority of today's information hiding systems uses multimedia objects like audio …

[PDF][PDF] Information hiding using audio steganography–a survey

P Jayaram, HR Ranganatha… - The International Journal …, 2011 - academia.edu
Today's large demand of internet applications requires data to be transmitted in a secure
manner. Data transmission in public communication system is not secure because of …

A secure data hiding scheme for binary images

YC Tseng, YY Chen, HK Pan - IEEE transactions on …, 2002 - ieeexplore.ieee.org
This letter presents a novel steganography scheme capable of concealing a piece of critical
information in a host message which is a binary image (eg, a facsimile). A binary matrix and …

[PDF][PDF] Digital watermarking for 3D polygons using multiresolution wavelet decomposition

S Kanai, H Date, T Kishinami - Proc. Sixth IFIP WG, 1998 - researchgate.net
Recently, much interest is being taken in methods to protect the copyright of digital data and
preventing illegal duplication of it. However, in the area of CAD/CAM and CG, there are no …