Introduction to Data Hiding Techniques
نویسنده
چکیده
Digital watermarking technology has been actively studied and developed by a number of institutions and companies since mid ‘90s. This area draws more and more attention as one of the key technology elements for content management, copyright protection and copy control of digital contents. This article discusses several different types of digital watermark application, particularly the application of digital watermarks for DVD copy control. This would be the first digital watermark application requiring worldwide standardization.
منابع مشابه
Techniques and applications of intelligent multimedia data hiding
In this paper, we present the intelligent multi-media data hiding techniques and their possible applications. An introduction on intelligent multimedia data hiding is described which covers backgrounds, recent advances, methodologies, and implementations. The recently developed research branch called reversible data hiding is also depicted. Two major classes for the implementation of reversible...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملEcho Hiding
Homomorphic signal processing techniques are used to place information imperceivably into audio data streams by the introduction of synthetic resonances in the form of closely spaced echoes These echoes can be used to place digital identi cation tags directly into an audio signal with minimal objectionable degradation of the original signal
متن کاملIntroducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملData Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image
An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...
متن کاملSTEGNOGRAPHY—“The Art of Hiding Information” A Study of Various Tools and Techniques along with Steganalysis
Stegnography is about hiding the information whether the hiding thing is an image only. We should encrypt the information before hiding it. Many different formats of files can be used to hide the information but digital files are most widely used because of their frequency on internet. There are varieties of stegnography tools available with their own strength and weaknesses. This paper is a gl...
متن کامل