Neil F. Johnson
George Mason University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Neil F. Johnson.
information hiding | 1998
Neil F. Johnson; Sushil Jajodia
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.
Information Technology | 1998
Neil F. Johnson; Sushil Jajodia
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Discovering and rendering useless such covert messages is a new art form known as steganalysis. The authors provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden information.
information hiding | 1999
Neil F. Johnson; Zoran Duric; Sushil Jajodia
Many techniques for watermarking of digital images have appeared in numerous publications. Most of these techniques are sensitive to cropping and/or affine distortions (e.g., rotation and scaling). In this paper we describe a method for the recovery of original size and appearance of images based on the concept of identification marks (“fingerprints”); the method does not require the use of the “original” image, but only a small number of salient image points. We show that, using our method, it is possible to recover original appearances of distorted images. The restored image can be used to recover embedded watermarks.
Archive | 2001
Neil F. Johnson; Zoran Duric; Sushil Jajodia
The purpose of a countermeasure is to thwart an attack on hidden information. Depending upon the intent of the hidden information, countermeasures may be to make the hidden information more difficult to detect (typical for steganography) or more robust to distortion (typical for digital watermarks).
IEEE Computer | 1998
Neil F. Johnson; Sushil Jajodia
Journal of Electronic Imaging | 2001
Neil F. Johnson; Zoran Duric; Sushil Jajodia; Nasir D. Memon
information hiding | 1999
Neil F. Johnson; Stefan Katzenbeisser
Archive | 2000
Neil F. Johnson; Zoran Duric; Sushil Jajodia
Archive | 2001
Neil F. Johnson; Zoran Duric; Sushil Jajodia
Archive | 1999
Zoran Duric; Neil F. Johnson; Sushil Jajodia