O'Reilly logo

Lossless Information Hiding in Images by Shi-Ze Guo, Zhe-Ming Lu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1.4. Overview of Information Hiding Techniques for Images

In this section, we provide an overview the information hiding techniques for images. That is, the cover object is a digital image, and after we embed the secret information into the cover image, we can get the stego image. According to different purposes and applications, we can mainly classify information hiding techniques into four categories, i.e., robust watermarking for copyright protection, fragile watermarking for content authentication, fingerprinting for transaction tracking, and steganography for covert communication. For these four categories, we do not care regarding the recoverability of the cover image after extracting the secret information in the stego image. For some areas, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required