Norishige Morimoto's research while affiliated with IBM and other places

Publications (4)

Article
Full-text available
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree...
Article
Data hiding is the process of embedding data into image and audio signals. The process is constrained by the quantity of data, the need for invariance of the data under conditions where the `host' signal is subject to distortions, e.g., compression, and the degree to which the data must be immune to interception, modification, or removal. We explor...

Citations

... High performance audio data-hiding algorithms are not easy to develop, because the human auditory system is very sensitive to small changes to the audio signal due to the secret data embedding Arnold (2002). Modifying the phase of several frequency components is another approach used to hide data in media Bender et al. (1996); Ansari et al. (2004) . When the frequency components are obtained using an orthogonal base, these datahiding schemes can be analyzed as Orthogonal Frequency-Division Multiplexing (OFDM) systems. ...
... Such techniques can be categorized into two types: visible watermarking and invisible watermarking. Invisible watermarking12345678 embeds a watermark in an image in a way that yields imperceptible results in the resulting stego-image under normal observations. The watermark is extracted from the stego-image for copyright claiming when necessary. ...
... Information safety has been one of the most important factors for information technology and communication since the rise of the internet (Morkel et al., 2005). Data hiding is the process of encapsulating information into media such as image and audio signals making it invisible to the human observer (Bender et al., 1995). The process is critical to ensure that even if the host signal is altered the data should continue to be buried within the host (Bender et al., 1995). ...
... In implementing the proposed algorithm, we used 20 audio signals in wav format with a length of 40 s, the sampling frequency of 44.1 kHz, and a depth of 16 bits selected files. 1 Four different software are used to simulate various signal processing attacks on audio signals. We used three of them to simulate SVM training data signal attacks and one other to simulate experimental audio signal attacks. ...