Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Neil F. Johnson is active.

Publication


Featured researches published by Neil F. Johnson.


information hiding | 1998

Steganalysis of Images Created Using Current Steganography Software

Neil F. Johnson; Sushil Jajodia

Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.


Information Technology | 1998

Steganalysis: the investigation of hidden information

Neil F. Johnson; Sushil Jajodia

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Discovering and rendering useless such covert messages is a new art form known as steganalysis. The authors provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden information.


information hiding | 1999

Recovery of Watermarks from Distorted Images

Neil F. Johnson; Zoran Duric; Sushil Jajodia

Many techniques for watermarking of digital images have appeared in numerous publications. Most of these techniques are sensitive to cropping and/or affine distortions (e.g., rotation and scaling). In this paper we describe a method for the recovery of original size and appearance of images based on the concept of identification marks (“fingerprints”); the method does not require the use of the “original” image, but only a small number of salient image points. We show that, using our method, it is possible to recover original appearances of distorted images. The restored image can be used to recover embedded watermarks.


Archive | 2001

Countermeasures to Attacks

Neil F. Johnson; Zoran Duric; Sushil Jajodia

The purpose of a countermeasure is to thwart an attack on hidden information. Depending upon the intent of the hidden information, countermeasures may be to make the hidden information more difficult to detect (typical for steganography) or more robust to distortion (typical for digital watermarks).


IEEE Computer | 1998

Exploring steganography: Seeing the unseen

Neil F. Johnson; Sushil Jajodia


Journal of Electronic Imaging | 2001

Information Hiding: Steganography and Watermarking—Attacks and Countermeasures

Neil F. Johnson; Zoran Duric; Sushil Jajodia; Nasir D. Memon


information hiding | 1999

A survey of steganographic tech-niques

Neil F. Johnson; Stefan Katzenbeisser


Archive | 2000

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures

Neil F. Johnson; Zoran Duric; Sushil Jajodia


Archive | 2001

Information Hiding: Steganography and Watermarking

Neil F. Johnson; Zoran Duric; Sushil Jajodia


Archive | 1999

Recovering watermarks from Images

Zoran Duric; Neil F. Johnson; Sushil Jajodia

Collaboration


Dive into the Neil F. Johnson's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zoran Duric

George Mason University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stefan Katzenbeisser

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge