Access the full text.
Sign up today, get DeepDyve free for 14 days.
I. Cox, Matthew Miller (1997)
Review of watermarking and the importance of perceptual modeling, 3016
Lin-Chun Lin, G. Doërr, I. Cox, Matthew Miller (2005)
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarkingIEEE International Conference on Image Processing 2005, 1
Nameer El-Emam (2008)
Embedding a Large Amount of Information Using High Secure Neural Based Steganography AlgorithmWorld Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2
Matthew Miller, I. Cox, J. Bloom (2000)
Informed embedding: exploiting image and detector information during watermark insertionProceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 3
J. Hernández, M. Amado, F. Pérez-González (2000)
DCT-domain watermarking techniques for still images: detector performance analysis and a new structureIEEE transactions on image processing : a publication of the IEEE Signal Processing Society, 9 1
M. Swanson, M. Kobayashi, A. Tewfik (1998)
Multimedia data-embedding and watermarking technologiesProc. IEEE, 86
M. Hwang, Chinchen Chang, K. Hwang (2000)
Digital watermarking of images using neural networksJ. Electronic Imaging, 9
J. Chou, S. Pradhan, L. Ghaoui, K. Ramchandran (2000)
Watermarking based on duality with distributed source coding and robust optimization principlesProceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 1
W. Bender, D. Gruhl, N. Morimoto, A. Lu (1995)
Techniques for data hiding, 2420
Jiajia Zhang, Hui-xian Huang, Chenhao Wang, Hongbin Pan (2008)
A steganographic method based on self-organizing map and HVS2008 International Conference on Audio, Language and Image Processing
Xinpeng Zhang, Shuozhong Wang (2006)
Efficient Steganographic Embedding by Exploiting Modification DirectionIEEE Communications Letters, 10
I. Cox, Matthew Miller, A. McKellips (1999)
Watermarking as communications with side informationProc. IEEE, 87
Joshua Smith, B. Comiskey (1996)
Modulation and Information Hiding in Images
C. Podilchuk, W. Zeng (1998)
Image-adaptive watermarking using visual modelsIEEE J. Sel. Areas Commun., 16
P. Werbos (1974)
Beyond Regression : "New Tools for Prediction and Analysis in the Behavioral Sciences
Pao-Ta Yu, Hung-Hsu Tsai, Jyh-Shyan Lin (2001)
Digital watermarking based on neural networks for color imagesSignal Process., 81
Huaiqing Wang, Shuozhong Wang (2004)
Cyber warfare: steganography vs. steganalysisCommun. ACM, 47
J. Chou, S. Pradhan, K. Ramchandran (1999)
On the duality between distributed source coding and data hidingConference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020), 2
Brian Chen, G. Wornell (2000)
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)
Chiou-Ting Hsu, Ja-Ling Wu (1998)
DCT-based watermarking for videoIEEE Transactions on Consumer Electronics, 44
Andreas Westfeld (2001)
F5-A Steganographic Algorithm
J. Fridrich, M. Goljan, Rui Du (2001)
Reliable detection of LSB steganography in color and grayscale images
M. Swanson, B. Zhu, A. Tewfik, L. Boney (1998)
Robust audio watermarking using perceptual maskingSignal Process., 66
Y. Tseng, Yu-Yuan Chen, Hsiang-Kuang Pan (2002)
A secure data hiding scheme for binary imagesIEEE Trans. Commun., 50
Raymond Wolfgang, C. Podilchuk, E. Delp (1999)
Perceptual watermarks for digital images and video, 3657
Chung-Ming Wang, N. Wu, Chwei-Shyong Tsai, M. Hwang (2008)
A high quality steganographic method with pixel-value differencing and modulus functionJ. Syst. Softw., 81
Y. Wang, J. Doherty, R. van Dyck
A novel wavelet‐based algorithm for watermarking digital images
I. Cox, J. Kilian, F. Leighton, T. Shamoon (1997)
Secure spread spectrum watermarking for multimediaIEEE transactions on image processing : a publication of the IEEE Signal Processing Society, 6 12
I. Cox, J. Kilian, F. Leighton, T. Shamoon (1996)
Secure spread spectrum watermarking for images, audio and videoProceedings of 3rd IEEE International Conference on Image Processing, 3
Da-Chun Wu, Wen-Hsiang Tsai (2003)
A steganographic method for images by pixel-value differencingPattern Recognit. Lett., 24
D. Kundur, D. Hatzinakos (1997)
A robust digital image watermarking method using wavelet-based fusionProceedings of International Conference on Image Processing, 1
D. Rumelhart, Geoffrey Hinton, Ronald Williams (1986)
Learning internal representations by error propagation
D. Kirovski, Henrique Malvar (2002)
Embedding and detecting spread-spectrum watermarks under estimation attacks2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2
I. Cox, Matthew Miller, Jmg Linnartz, T. Kalker (1999)
A Review of of Watermarking Principles and Practices
C. Shannon (1958)
Channels with Side Information at the TransmitterIBM J. Res. Dev., 2
R.D. Reed, R.J. Marks
Neural Smithing
M. Costa (1983)
Writing on dirty paperIEEE Trans. Inf. Theory, 29
D. Kundur, D. Hatzinakos (1998)
Semi-blind image restoration based on telltale watermarkingConference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284), 2
S. Voloshynovskiy, A. Herrigel, Nazanin Baumgaertner, T. Pun (1999)
A Stochastic Approach to Content Adaptive Digital Image Watermarking
L. Kamstra, H. Heijmans (2005)
Reversible data embedding into images using wavelet techniques and sortingIEEE Transactions on Image Processing, 14
Ruey-Ming Chao, Hsien-Chung Wu, Chih-Chiang Lee, Y. Chu (2009)
A Novel Image Data Hiding Scheme with Diamond EncodingEURASIP Journal on Information Security, 2009
N. Johnson, S. Jajodia (1998)
Steganalysis of Images Created Using Current Steganography Software
P. Moulin, J. O’Sullivan (2000)
Information-theoretic analysis of information hiding2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)
J. Aguilar, Juan Anderson (2011)
A Neural Watermark Approach
B. Chen, G. Wornell (1999)
An information-theoretic approach to the design of robust digital watermarking systems1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258), 4
Kenneth Davis, K. Najarian (2001)
Maximizing strength of digital watermarks using neural networksIJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222), 4
R.B. Wolfgang, C.I. Podilchuk, E.J. Delp
Perceptual watermarks for image and video
I. Cox, Matthew Miller (2002)
The First 50 Years of Electronic WatermarkingEURASIP Journal on Advances in Signal Processing, 2002
D. Kirovski, Henrique Malvar (2001)
Spread-spectrum audio watermarking: requirements, applications, and limitations2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564)
Chi-Kwong Chan, Lee-Ming Cheng (2004)
Hiding data in images by simple LSB substitutionPattern Recognit., 37
J. Chou, S.S. Pradhan, K. Ramchandran
On the duality between data hiding and distributed source coding
Purpose – The purpose of this paper is to present a novel approach for digital watermarking and steganography technique that uses neural networks. The performance of the proposed solution in terms of its capacity, transparency, and robustness is investigated. Design/methodology/approach – The proposed technique trains a neural network to learn the perceptual masking model of the human vision system. Once trained, the neural network identifies pixels whose most significant alteration will be least perceptible to the human eye. The image is then altered based on the network recommendation to include the watermark or the covert data. Findings – Experimental results demonstrate that the proposed technique offers excellent transparency and good capacity. In addition, since neural networks store their learned knowledge in a distributed fashion, steganalysis of the image without access to the network is very difficult, if not impossible. Results demonstrate good performance of the proposed solution in terms of its capacity, transparency, and robustness. Originality/value – Use of neural networks in extracting and representing perceptual masking model of human vision system is interesting. Value added by the proposed approach is in its use of artificial neural networks to model the perceptual masking model of human vision system for injecting imperceptible data into most perceptually significant pits of an image. The proposed approach may be used in combination with most current and popular methods with little impact on perceptual quality of the resulting image.
International Journal of Intelligent Computing and Cybernetics – Emerald Publishing
Published: Aug 24, 2010
Keywords: Neural nets; Data management; Data security; Digital storage; Encoders
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.