Introduction to Data Hiding Techniques

نویسنده

  • Norishige Morimoto
چکیده

Digital watermarking technology has been actively studied and developed by a number of institutions and companies since mid ‘90s. This area draws more and more attention as one of the key technology elements for content management, copyright protection and copy control of digital contents. This article discusses several different types of digital watermark application, particularly the application of digital watermarks for DVD copy control. This would be the first digital watermark application requiring worldwide standardization.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Techniques and applications of intelligent multimedia data hiding

In this paper, we present the intelligent multi-media data hiding techniques and their possible applications. An introduction on intelligent multimedia data hiding is described which covers backgrounds, recent advances, methodologies, and implementations. The recently developed research branch called reversible data hiding is also depicted. Two major classes for the implementation of reversible...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Echo Hiding

Homomorphic signal processing techniques are used to place information imperceivably into audio data streams by the introduction of synthetic resonances in the form of closely spaced echoes These echoes can be used to place digital identi cation tags directly into an audio signal with minimal objectionable degradation of the original signal

متن کامل

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

Data Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

متن کامل

STEGNOGRAPHY—“The Art of Hiding Information” A Study of Various Tools and Techniques along with Steganalysis

Stegnography is about hiding the information whether the hiding thing is an image only. We should encrypt the information before hiding it. Many different formats of files can be used to hide the information but digital files are most widely used because of their frequency on internet. There are varieties of stegnography tools available with their own strength and weaknesses. This paper is a gl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999