Home | Introduction to Steganography | Mod4 vs F5 | How M4JPEG Works | M4JPEG Download | Matlab JPEG Toolbox
 
 
 

Information Hiding
and its Applications

Steganography and Watermarking
A detailed look at Steganography
   ◦ Text Steganography
   ◦ Hypertext Steganography
   ◦ Audio Steganography
   ◦ Image Steganography
   ◦ Steganography in Open System
Image Steganography Techniques
   ◦ Spatial Domain LSB Insertion
   ◦ Masking and Filtering
   ◦ DCT-based Steganography
   ◦ Wavelet-based Steganography
How to Detect Steganography
   ◦ Blind Detection
   ◦ Analytical Detection



Applications of Information Hiding

Several interesting applications may be achieved by using the techniques of information hiding. We briefly mention some of these applications:

1. Copyright Protection:

The pressing need of protecting intellectual property rights is the main driving force of the research in information hiding. A digital watermark representing the copyright information can be embedded into the media data so that the owners can claim their ownership of the data in court by extracting the watermark unambiguously if someone infringes on their copyright.

2. Fingerprinting:

The application of fingerprinting works in a slightly different way to protect the media content. To avoid unauthorized duplication and distribution of the multimedia content, an author can embed a distinct label as fingerprint into each copy of the data. If an unauthorized copy is found later, the origin of the copy can be traced by retrieving the fingerprint. Besides, if the fingerprint represents certain customers' personal information such as the credit card number, the original buyers will think twice before they distribute the received data to others because they will run the risk of spreading their own personal information around.

3. Authentication:

Multimedia data in digital format facilitate modifying and editing but problems arise when the possibly tampered data are to be used for legal purposes or the authenticity of the data is important to the users. In such situations, the data must be credible, the information content in the signal is not modified in transit to its destination. Information hiding provides a tamper-proofing tool for digital content. Once the content is manipulated, the embedded signal or watermark will be affected or even destroyed so that its status or existence can be used to verify the integrity of the content. Although authentication of media content can be achieved through conventional cryptographic techniques, the advantage of using information hiding is that the authenticator is inseparably bound to the content, which simplifies data handling.

4. Usage Control:

In some applications in which the multimedia content needs special hardware for copying or viewing, a digital watermark can be used to control the usage, such as the permission of viewing, listening or recording, etc. If the media player or recorder detects illegal copies based on an unmatched watermark, it will refuse to play or record the digital data.

5. Convert communication:

The nature of media data, such as images, audio and video, provides a good host for hiding the high-volume information in steganographic applications. By using the innocuous host media data as a cover, we may fool possible eavesdroppers to communicate with the trusted party secretly. From a communication viewpoint, the host media can be seen as a secret channel. Obviously, covert communication may be of military usage. Besides, some governments limit the usage of encryption services and information hiding may be a way to bypass the restriction.

6. Broadcast monitoring:

Broadcast monitoring is one of the potential applications that can be achieved by information hiding techniques. Advertisers, who pay the television or radio stations for commercial advertisements, would like to ensure those advertisements be broadcast as promised. The insertion and detection of the hidden signal may help them to verify this without involving much human effort for monitoring. Broadcast monitoring via information hiding can be achieved by either watermarking or steganography. We may embed the signal in some particular segments of the broadcast channels, which are available but not used for content transmission. The drawback is that special equipment may be required for handling the additional signal. Embedding a digital watermark in the media content as the controlled signal has the advantage of being fully compatible with the installed broadcast equipment. The primary disadvantage is its comparatively complicated embedding/detection process.

7. Annotation:

The bits embedded into the media data may comprise an annotation, giving further information about the media content. For example, a photographic image could be labeled to describe the time and place the photograph was taken, a procedure that could be done automatically by the processor in a camera. In multimedia databases, a digital watermark may represent a serial number or an index for efficient management. Besides, a digital watermark can be a flag to indicate types and properties of the content, which may possibly be used to track pornography on the network. In medical applications, embedding the date and patient's name in medical images could be a useful safety measure.


Reference:
Information Hiding in Digital Images: Watermarking and Steganography, by Po-Chyi Su, May 2003.

Home | Introduction to Steganography | Mod4 vs F5 | How M4JPEG Works | M4JPEG Download | Matlab JPEG Toolbox