Steganography: Information Embedding, Digital Watermarking, and Data Hiding

Home
Full List of Titles
1: Speech Processing
CELP Coding
Large Vocabulary Recognition
Speech Analysis and Enhancement
Acoustic Modeling I
ASR Systems and Applications
Topics in Speech Coding
Speech Analysis
Low Bit Rate Speech Coding I
Robust Speech Recognition in Noisy Environments
Speaker Recognition
Acoustic Modeling II
Speech Production and Synthesis
Feature Extraction
Robust Speech Recognition and Adaptation
Low Bit Rate Speech Coding II
Speech Understanding
Language Modeling I
2: Speech Processing, Audio and Electroacoustics, and Neural Networks
Acoustic Modeling III
Lexical Issues/Search
Speech Understanding and Systems
Speech Analysis and Quantization
Utterance Verification/Acoustic Modeling
Language Modeling II
Adaptation /Normalization
Speech Enhancement
Topics in Speaker and Language Recognition
Echo Cancellation and Noise Control
Coding
Auditory Modeling, Hearing Aids and Applications of Signal Processing to Audio and Acoustics
Spatial Audio
Music Applications
Application - Pattern Recognition & Speech Processing
Theory & Neural Architecture
Signal Separation
Application - Image & Nonlinear Signal Processing
3: Signal Processing Theory & Methods I
Filter Design and Structures
Detection
Wavelets
Adaptive Filtering: Applications and Implementation
Nonlinear Signals and Systems
Time/Frequency and Time/Scale Analysis
Signal Modeling and Representation
Filterbank and Wavelet Applications
Source and Signal Separation
Filterbanks
Emerging Applications and Fast Algorithms
Frequency and Phase Estimation
Spectral Analysis and Higher Order Statistics
Signal Reconstruction
Adaptive Filter Analysis
Transforms and Statistical Estimation
Markov and Bayesian Estimation and Classification
4: Signal Processing Theory & Methods II, Design and Implementation of Signal Processing Systems, Special Sessions, and Industry Technology Tracks
System Identification, Equalization, and Noise Suppression
Parameter Estimation
Adaptive Filters: Algorithms and Performance
DSP Development Tools
VLSI Building Blocks
DSP Architectures
DSP System Design
Education
Recent Advances in Sampling Theory and Applications
Steganography: Information Embedding, Digital Watermarking, and Data Hiding
Speech Under Stress
Physics-Based Signal Processing
DSP Chips, Architectures and Implementations
DSP Tools and Rapid Prototyping
Communication Technologies
Image and Video Technologies
Automotive Applications / Industrial Signal Processing
Speech and Audio Technologies
Defense and Security Applications
Biomedical Applications
Voice and Media Processing
Adaptive Interference Cancellation
5: Communications, Sensor Array and Multichannel
Source Coding and Compression
Compression and Modulation
Channel Estimation and Equalization
Blind Multiuser Communications
Signal Processing for Communications I
CDMA and Space-Time Processing
Time-Varying Channels and Self-Recovering Receivers
Signal Processing for Communications II
Blind CDMA and Multi-Channel Equalization
Multicarrier Communications
Detection, Classification, Localization, and Tracking
Radar and Sonar Signal Processing
Array Processing: Direction Finding
Array Processing Applications I
Blind Identification, Separation, and Equalization
Antenna Arrays for Communications
Array Processing Applications II
6: Multimedia Signal Processing, Image and Multidimensional Signal Processing, Digital Signal Processing Education
Multimedia Analysis and Retrieval
Audio and Video Processing for Multimedia Applications
Advanced Techniques in Multimedia
Video Compression and Processing
Image Coding
Transform Techniques
Restoration and Estimation
Image Analysis
Object Identification and Tracking
Motion Estimation
Medical Imaging
Image and Multidimensional Signal Processing Applications I
Segmentation
Image and Multidimensional Signal Processing Applications II
Facial Recognition and Analysis
Digital Signal Processing Education

Author Index
A B C D E F G H I
J K L M N O P Q R
S T U V W X Y Z

An Information-Theoretic Approach to the Design of Robust Digital Watermarking Systems

Authors:

Brian Chen,
Gregory W Wornell,

Page (NA) Paper number 3007

Abstract:

A variety of emerging applications require the design of systems for embedding one signal within another signal. We describe a new class of embedding methods called quantization index modulation (QIM) and develop a realization termed coded dither modulation in which the embedded information modulates the dither signal of a dithered quantizer. We also develop a framework in which one can analyze performance trade-offs among robustness, distortion, and embedding rate, and we show that QIM systems have considerable performance advantages over previously proposed spread-spectrum and low-bit modulation systems.

IC993007.PDF (From Author) IC993007.PDF (Rasterized)

TOP


A Rotation, Scale and Translation Resilient Public Watermark

Authors:

Min Wu,
Matt L. Miller,
Jeffrey A. Bloom,
Ingemar J Cox,

Page (NA) Paper number 3008

Abstract:

Watermarking algorithms that are robust to the common geometric transformations of rotation, scale and translation (RST) have been reported for cases in which the original unwatermarked content is available at the detector so as to allow the transformations to be inverted. However, for public watermarks the problem is significantly more difficult since there is no original content to register with. Two classes of solution have been proposed. The first embeds a registration pattern into the content while the second seeks to apply detection methods that are invariant to these geometric transformations. This paper describes a public watermarking method which is invariant (or bares simple relation) to the common geometric transforms of rotation, scale, and translation. It is based on the Fourier-Mellin transform which has previously been suggested. We extend this work, using a variation based on the Radon transform. The watermark is inserted into a projection of the image. The properties of this projection are such that RST transforms produce simple or no effects on the projection waveform. When a watermark is inserted into a projection, the signal must eventually be back projected to the original image dimensions. This is a one to many mapping that allows for considerable flexibility in the watermark insertion process. We highlight some theoretical and practical issues that affect the implementation of an RST invariant watermark. Finally, we describe preliminary experimental results.

IC993008.PDF (From Author) IC993008.PDF (Scanned)

TOP


If One Watermark is Good, Are More Better?

Authors:

Fred Mintzer,
Gordon W Braudaway,

Page (NA) Paper number 3009

Abstract:

Invisible watermarks are not all alike. Different techniques are used to embed different types of watermarks into digital media objects to accomplish different goals. Some watermarks are intended to robustly carry ownership information; some are intended to carry content-verification information; and some are intended to convey side information, or captions. In this talk, some opportunities to employ multiple watermarks to convey multiple sets of information, intended to satisfy differing or similar goals, are examined. Problems presented by the insertion of multiple watermarks are discussed. Progress towards developing techniques that embed multiple watermarks into an image will also be presented.

IC993009.PDF (From Author) IC993009.PDF (Rasterized)

TOP


Detecting Electronic Watermarks in Digital Video

Authors:

Jean-Paul Linnartz,
Ton Kalker,
Jaap Haitsma,

Page (NA) Paper number 3010

Abstract:

Electronic watermarking is an active area of research with many applications bei ng foreseen. Watermarks may be come an essential tool for copy management in future Con sumer Electronic or PC devices. With simple circuits, de tection of watermarks after noise addition, MPEG com pression, D/A conversion, pixel shifts appears feasible, but detection after tra nsformations, such as cropping and stretching, remains a challenge. We propose a model to evaluate the effect of scaling on the detector reliability and verify it with experiments.

IC993010.PDF (From Author) IC993010.PDF (Rasterized)

TOP


Data Embedding in Audio: Where Do We Stand

Authors:

Ahmed H Tewfik,
Mitchell D Swanson,
Bin Zhu,

Page (NA) Paper number 3011

Abstract:

Data embedding algorithms embed binary streams in host multimedia signals. The embedded data can add features to the host multimedia signal or provide copyright protection. We review requirements for transparent data embedding techniques in audio signals. We describe and contrast current approaches to data embedding in audio. In particular, we emphasize the advantages and limitations of the various approaches. we also describe possible signal processing and protocol level attacks on audio watermarking algorithms. We conclude with a discussion of future research directions.

IC993011.PDF (From Author) IC993011.PDF (Rasterized)

TOP


The Business Case for Audio Watermarking

Authors:

Paul Jessop,

Page (NA) Paper number 3012

Abstract:

This presentation will review the applications of audio watermarking for the recording industry. It will examine the reasons for placing watermarks in sound recordings, the benefits which might result and the potential hazards which need to be overcome. It will cover the objectives, methodology and results of the MUSE project, one of whose tasks was the evaluation of ``embedded signaling'' systems. Finally, it will look at recent developments in the adoption of watermarking in the recording industry.

IC993012.PDF (From Author) IC993012.PDF (Rasterized)

TOP