By Topic

Secure and robust steganography using side information at the encoder

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Hogan, M.T. ; Sch. of Comput. Sci. & Informatics, Univ. Coll. Dublin ; Balado, F. ; Silvestre, G.C.M. ; Hurley, N.J.

Two important classes of data hiding methods are the ones established by watermarking and steganographic applications. Whereas in both cases information is concealed inside a host signal subject to an imperceptibility constraint, some of their fundamental requirements differ. Indeed, the design of watermarking schemes is usually guided by the maximum achievable rate with respect to a given attack power, while the most important constraint for steganographic methods is the undetectability of the hidden communication. In this work we examine the tradeoff between achievable rate and undetectability when watermarking and steganographic constraints are simultaneously imposed to a data hiding scheme. In order to illustrate this tradeoff we focus our attention on two relevant methods which are parallel in their structures, and are, respectively, suitable for the two problems at hand. The first one, distortion-compensated dither modulation, is nearly optimal with respect to the watermarking-like requirements. The second one, stochastic quantisation index modulation, automatically meets the undetectability condition under certain assumptions. Conclusions are drawn as to which scheme is preferable for joint watermarking and steganography constraints, given certain channel characteristics

Published in:

Information Security, IEE Proceedings  (Volume:153 ,  Issue: 3 )