C Cachin - International Workshop on Information Hiding, 1998 - Springer
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modified …
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental …
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means" covered writing" in Greek, is the …
The audio watermarking method proposed in this paper offers copyright protection to an audio signal by time domain processing. The strength of audio signal modifications is limited …
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object …
P Dutta, D Bhattacharyya, T Kim - International journal of database …, 2009 - academia.edu
Abstract Information hiding technique is a new kind of secret communication technology. The majority of today's information hiding systems uses multimedia objects like audio …
P Jayaram, HR Ranganatha… - The International Journal …, 2011 - academia.edu
Today's large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of …
YC Tseng, YY Chen, HK Pan - IEEE transactions on …, 2002 - ieeexplore.ieee.org
This letter presents a novel steganography scheme capable of concealing a piece of critical information in a host message which is a binary image (eg, a facsimile). A binary matrix and …
S Kanai, H Date, T Kishinami - Proc. Sixth IFIP WG, 1998 - researchgate.net
Recently, much interest is being taken in methods to protect the copyright of digital data and preventing illegal duplication of it. However, in the area of CAD/CAM and CG, there are no …