ABSTRACT
A novel steganographic approach analogy to the real-world secret communication mechanism, in which secret messages are written on white papers using invisible ink like lemon juice and are revealed only after the papers are heated, is proposed. Carefully-designed informed embedders now play the role of "invisible ink"; some pre-negotiated attacks provided by common content-processing tools correspond to the required "heating" process. Theoretic models and feasible implementations of the proposed digital-invisible-ink watermarking approach based on both blind-detection spread-spectrum watermarking and quantization watermarking schemes are provided. The proposed schemes can prevent the supervisor from interpreting secret messages even when the watermark extractor and decryption tool, as well as session keys, are available to the supervisor. Furthermore, secret communication systems employing the proposed scheme can aggressively mislead the channel supervisor with fake watermarks and transmit genuine secrets at the same time.
Index Terms
- Digital invisible ink: revealing true secrets via attacking
Recommendations
Digital invisible ink and its applications in steganography
MM&Sec '06: Proceedings of the 8th workshop on Multimedia and securityA novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded as an extension of the informed-embedding methodology. Messages hidden in ...
Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques
A novel data-hiding methodology, denoted as digital invisible ink (DII), is proposed to implement secure steganography systems. Like the real-world invisible ink, secret messages will be correctly revealed only after the marked works undergo certain ...
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
Comments