next up previous
Next: Embedding System Up: SECURE HIGH DATA EMBEDDING Previous: SECURE HIGH DATA EMBEDDING

Introduction

The last decade has experienced a rapid evolution in multimedia storage and transmission technology. Part of this evolution was the development of the field of multimedia security and copyright protection. The field emerged because of the growing concern about the ease of copying and reproducing data sources in a digital format. This can increase the chance of theft and piracy of intellectual property. Researchers have proposed the use of digital watermarking as a means of copyright protection and data authentication [1]. Furthermore, there are other applications related to security such as transmitting information between two or more parties using what is known as subliminal channels. This is a form of digital steganography in which information is embedded into a data source in such a way that its very existence is concealed.

In steganographic applications emphasis is concentrated on security and on preventing the detection of the hidden information. There are many steganographic techniques that can be found in the literature. Some of these techniques rely on embedding the information in the least significant bits [2]. Other techniques use image palettes [3] to embed information. Still more techniques use spread spectrum modulation techniques [4]. Further details on different steganographic techniques are contained in the following references [5,6,7]. In this paper we describe a new steganographic technique for embedding a large amount of information inside a cover image. The technique is based on the principle of decorrelating the cover image samples. Decorrelating the image samples results in a two dimensional set of independent and identically distributed samples. These samples have a Gaussian distribution in the transform domain. The decorrelated image has components at all frequencies. Therefore, the image transform coefficients will occupy the entire image spectrum, hence producing more coefficients to be used to embed information. Image decorrelation is obtained by using a key which can be either private or public. Data embedding and extraction is performed using quantization principles. The transform coefficients amplitudes are modified in such a way that they resolve whether a binary "1" or "0" is embedded when divided by some threshold . This paper is organized as follows. In Section 2, we describe our data embedding system. In Section 3 we examine the security of the system. In Section 4 we present an example for our proposed system, and Section 5, gives our conclusion and suggestion for future work.


next up previous
Next: Embedding System Up: SECURE HIGH DATA EMBEDDING Previous: SECURE HIGH DATA EMBEDDING
Muhammad Zubair Ikram
7/14/2000