Sanity vs. invisible markings
Abstract
Index Terms
- Sanity vs. invisible markings
Recommendations
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
Digital invisible ink: revealing true secrets via attacking
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications securityA novel steganographic approach analogy to the real-world secret communication mechanism, in which secret messages are written on white papers using invisible ink like lemon juice and are revealed only after the papers are heated, is proposed. Carefully-...
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Opinion
- Popular
- Un-reviewed
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 3,270Total Downloads
- Downloads (Last 12 months)175
- Downloads (Last 6 weeks)36
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderDigital Edition
View this article in digital edition.
Digital EditionMagazine Site
View this article on the magazine site (external)
Magazine SiteLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in