TY - GEN
T1 - A zero-watermarking-like steganography and potential applications
AU - Ishizuka, Hirokazu
AU - Echizen, Isao
AU - Iwamura, Keiichi
AU - Sakurai, Koichi
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/24
Y1 - 2014/12/24
N2 - We propose a new steganographic method which is similar to zero-watermarking. In general, digital steganography and digital watermarking, which both embed secret information in host data, have different intended uses. Digital steganography carries embedded secret information through public networks, and the host data serves only as camouflage. Digital watermarking is used to protect host data by embedding secret information. However, the concept of zero-watermarking was proposed in 2001. It does not embed secret information in host data and a result obtained by the interaction of secret information and host data is registered into a certificate authority for protecting the of host data. Our method is also intended to be included in the concept of zero-watermarking broadly. In this paper, we will clarify the difference of zerowatermarking and our method, evaluate the noise immunity of our method, and discuss with various application possibilities.
AB - We propose a new steganographic method which is similar to zero-watermarking. In general, digital steganography and digital watermarking, which both embed secret information in host data, have different intended uses. Digital steganography carries embedded secret information through public networks, and the host data serves only as camouflage. Digital watermarking is used to protect host data by embedding secret information. However, the concept of zero-watermarking was proposed in 2001. It does not embed secret information in host data and a result obtained by the interaction of secret information and host data is registered into a certificate authority for protecting the of host data. Our method is also intended to be included in the concept of zero-watermarking broadly. In this paper, we will clarify the difference of zerowatermarking and our method, evaluate the noise immunity of our method, and discuss with various application possibilities.
UR - http://www.scopus.com/inward/record.url?scp=84921637416&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84921637416&partnerID=8YFLogxK
U2 - 10.1109/IIH-MSP.2014.121
DO - 10.1109/IIH-MSP.2014.121
M3 - Conference contribution
AN - SCOPUS:84921637416
T3 - Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
SP - 459
EP - 462
BT - Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
A2 - Watada, Junzo
A2 - Ito, Akinori
A2 - Pan, Jeng-Shyang
A2 - Chao, Han-Chieh
A2 - Chen, Chien-Ming
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
Y2 - 27 August 2014 through 29 August 2014
ER -