Paper
3 January 1996 Data embedding method
Maxwell T. Sandford II, Jonathan N. Bradley, Theodore G. Handel
Author Affiliations +
Abstract
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Maxwell T. Sandford II, Jonathan N. Bradley, and Theodore G. Handel "Data embedding method", Proc. SPIE 2615, Integration Issues in Large Commercial Media Delivery Systems, (3 January 1996); https://doi.org/10.1117/12.229207
Lens.org Logo
CITATIONS
Cited by 4 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Image compression

Image processing

Raster graphics

Data communications

Computer security

Statistical analysis

RELATED CONTENT

Scan image compression-encryption hardware system
Proceedings of SPIE (April 17 1995)
A Pyramid Of Image Generating Functions
Proceedings of SPIE (October 13 1987)
Secure image communication for network applications
Proceedings of SPIE (May 02 2006)
Spatial watermark for image verification
Proceedings of SPIE (May 09 2000)

Back to Top