Fred Hatfull
April 29, 2011
Case Western Reserve University
This repository is a collection of algorithms accompanying my paper for MATH 408 in the spring of 2011 at Case Western Reserve University. An overview of the talk given supporting the paper is available on my website and the paper itself can be downloaded here. Included in this collection of algorithms are implementations of an LSB hiding scheme and an echo hiding scheme.
Requirements for this software have been estimated but not explored. To run the algorithms, you'll need:
- Python 2.7 (other 2.x versions might work, but I have only tested against 2.7)
- MATLAB and the Signal Processing Toolbox
References
-
P. Dutta, D. Bhattacharyya, and T. Kim, "Data Hiding in Audio Signal: A Review," in International Journal of Database Theory and Application, vol. 2, no. 2, June 2009.
-
D. Gruhl, W. Bender, and A. Lu, "Echo hiding," in Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 295-315.
-
L. Boney, A. H. Tewfik, and K. N. Hamdy, "Digital watermarks for audio signals," in Proc. 1996 IEEE Int. Conf. Multimedia Computing and Systems, Hiroshima, Japan, June 17-23, 1996, pp. 473-480.
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Attacks on copyright marking systems," in Information Hiding, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin / Heidelberg, Nov. 1998, vol. 1525, ch. 16, pp. 218-238.
-
Y. Wu, "Nonlinear Collusion Attack on a Watermarking Scheme for Buyer Authentication," in IEEE Transactions on Multimedia, vol. 8, no. 3, June 2006, pp. 626-629.