Modulation and Information Hiding in Images

作者: Joshua R. Smith , Barrett O. Comiskey

DOI: 10.1007/3-540-61996-8_42

关键词:

摘要: We use concepts from communication theory to characterize information hiding schemes: the amount of that can be hidden, its perceptibility, and robustness removal modeled using quantities channel capacity, signal-to-noise ratio, jamming margin. then introduce new schemes whose parameters easily adjusted trade off imperceptibility, as required in application. The indicates most aggressive feasible parameter settings. also a technique called predistortion for increasing resistance JPEG compression. Analogous tactics are presumably possible whenever model anticipated distortion is available.

参考文章(12)
Michael F Barnsley, Lyman P Hurd, None, Fractal Image Compression ,(1993)
Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon, A Secure, Robust Watermark for Multimedia information hiding. pp. 185- 206 ,(1996) , 10.1007/3-540-61996-8_41
Birgit Pfitzmann, Trials of Traced Traitors information hiding. pp. 49- 64 ,(1996) , 10.1007/3-540-61996-8_31
Jim K. Omura, Robert A. Scholtz, Barry K. Levitt, Marvin K. Simon, Spread spectrum communications handbook (revised ed.) Spread spectrum communications handbook (revised ed.). pp. 1228- 1228 ,(1994)
CE Shennon, Warren Weaver, A mathematical theory of communication Bell System Technical Journal. ,vol. 27, pp. 379- 423 ,(1948) , 10.1002/J.1538-7305.1948.TB01338.X
C Shanndn, W Weaver, The Mathematical Theory of Communication ,(1948)
F.M. Boland, Watermarking digital images for copyright protection Fifth International Conference on Image Processing and its Applications. pp. 326- 330 ,(1995) , 10.1049/CP:19950674
Walter R. Bender, Daniel Gruhl, Norishige Morimoto, Techniques for data hiding Storage and Retrieval for Image and Video Databases. ,vol. 2420, pp. 164- 173 ,(1995) , 10.1117/12.205315