ICA based steganography

Stephane Bounkong, David Saad, David Lowe

Research output: Contribution to conferencePaper

Abstract

A domain independent ICA-based watermarking method is introduced and studied by numerical simulations. This approach can be used either on images, music or video to convey a hidden message. It relies on embedding the information in a set of statistically independent sources (the independent components) as the feature space. For the experiments the medium has arbritraly chosen to be digital images.
Original languageEnglish
Pages1-5
Number of pages5
Publication statusPublished - 2002
EventSecond IMA International Conference on Mathematics in Communications -
Duration: 1 Jan 20021 Jan 2002

Conference

ConferenceSecond IMA International Conference on Mathematics in Communications
Period1/01/021/01/02

Fingerprint

Steganography
Independent component analysis
Watermarking
Computer simulation
Experiments

Keywords

  • watermarking method
  • numerical simulations

Cite this

Bounkong, S., Saad, D., & Lowe, D. (2002). ICA based steganography. 1-5. Paper presented at Second IMA International Conference on Mathematics in Communications, .
Bounkong, Stephane ; Saad, David ; Lowe, David. / ICA based steganography. Paper presented at Second IMA International Conference on Mathematics in Communications, .5 p.
@conference{6b107d9ab3af4639800896be72d396cb,
title = "ICA based steganography",
abstract = "A domain independent ICA-based watermarking method is introduced and studied by numerical simulations. This approach can be used either on images, music or video to convey a hidden message. It relies on embedding the information in a set of statistically independent sources (the independent components) as the feature space. For the experiments the medium has arbritraly chosen to be digital images.",
keywords = "watermarking method, numerical simulations",
author = "Stephane Bounkong and David Saad and David Lowe",
year = "2002",
language = "English",
pages = "1--5",
note = "Second IMA International Conference on Mathematics in Communications ; Conference date: 01-01-2002 Through 01-01-2002",

}

Bounkong, S, Saad, D & Lowe, D 2002, 'ICA based steganography' Paper presented at Second IMA International Conference on Mathematics in Communications, 1/01/02 - 1/01/02, pp. 1-5.

ICA based steganography. / Bounkong, Stephane; Saad, David; Lowe, David.

2002. 1-5 Paper presented at Second IMA International Conference on Mathematics in Communications, .

Research output: Contribution to conferencePaper

TY - CONF

T1 - ICA based steganography

AU - Bounkong, Stephane

AU - Saad, David

AU - Lowe, David

PY - 2002

Y1 - 2002

N2 - A domain independent ICA-based watermarking method is introduced and studied by numerical simulations. This approach can be used either on images, music or video to convey a hidden message. It relies on embedding the information in a set of statistically independent sources (the independent components) as the feature space. For the experiments the medium has arbritraly chosen to be digital images.

AB - A domain independent ICA-based watermarking method is introduced and studied by numerical simulations. This approach can be used either on images, music or video to convey a hidden message. It relies on embedding the information in a set of statistically independent sources (the independent components) as the feature space. For the experiments the medium has arbritraly chosen to be digital images.

KW - watermarking method

KW - numerical simulations

M3 - Paper

SP - 1

EP - 5

ER -

Bounkong S, Saad D, Lowe D. ICA based steganography. 2002. Paper presented at Second IMA International Conference on Mathematics in Communications, .