1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

Slides:



Advertisements
Similar presentations
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Advertisements

BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Watermarking For Image Authentication Presented by San-Hao Wang.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Steganography Project Project By: Awadesh Madhogaria.
 View Ribbon, Document Views group, click “Print Layout”  Standard working view for print documents  Default view in Word 2010  Shows you how your.
Procedures 6.02 Apply procedures to develop multimedia presentations used in business.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Hiding Data in “Plain Sight” Computer Forensics BACS 371.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Data Hiding in binary images using block parity Group ID -17 Guided by Mr. Pramod Ganjewar By – Sipendra Sinha Deepak Kumar Rohit Singh Amol Gaikwad Snehal.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
File Sizes & Storage Requirements.  An image has a width in pixels and a height in pixels  Start by calculating the number of pixels all up  640 x.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
A New Semantic Fingerprint Synonym substitution is a new way to fingerprint a document in logical markup, without changing its semantics. —— Fingerprinting.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Creates the file on disk and opens it for writing
Steganography Example
Binary 4 File Sizes.
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Date: Time: Location: Contact:
Source : Signal Processing, Volume 133, April 2017, Pages
Images in Binary.
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Summer Term Year 10 Slides
Creates the file on disk and opens it for writing
Embedding Secrets Using Magic Matrices
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Some Novel Steganographic Methods for Digital Images
Date: Time: Location: Contact:
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Data hiding based Hamming code
Digital Steganography Utilizing Features of JPEG Images
Can you calculate the actual file size of a computer image
High Capacity Data Hiding for Grayscale Images
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
The Image The pixels in the image The mask The resulting image 255 X
Source: Signal Processing: Image Communication 16 (2001) pp
Source: IEICE-Transactions on Info and Systems
De-clustering and Its Application to Steganography
An Iterative Method for Lossless Data Embedding in BMP Images
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Information Hiding Techniques Using Magic Matrix
JPEG Steganalysis Statistical Offset Tests
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Date: Time: Location: Contact:
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10

2 Outline Steganography ISM (Inter-word space) Modulation of the Inter-word Space Embedding rule Hidden Data Extraction Reference

3 Steganography What to hide  Text  Images  Sound How to hide  Embed text in text/image/sound files  Embed image in text/image/sound files  Embed sound in text/image/sound files

4 ISM (Inter-word space)(1/2) A space between adjacent words in a text row. There are nine inter-word spaces in the row. The actual length of the inter-word spaces in terms of number of pixels.  1 pixel -> 1 bit.  For example,”1”for black and “0” for white.

5 ISM (Inter-word space)(2/2)

6 Modulation of the Inter-word Space(1/2)

7 Modulation of the Inter-word Space(2/2) After data embedding:

8 Embedding rule(1/2)

9 Embedding rule(2/2)

10 Hidden Data Extraction(1/2)

11 Hidden Data Extraction(2/2) If Φ A - Φ B >0, bit ‘1’ is extracted. If Φ A - Φ B <0, bit ‘0’ is extracted.

12 Reference  wikipedia _Hiding_Robust_to_Printing_Copying_and_Scanning.pdf _Hiding_Robust_to_Printing_Copying_and_Scanning.pdf