메뉴 건너뛰기




Volumn 4518, Issue , 2001, Pages 216-227

Communication and information theory in watermarking: A survey

Author keywords

Communication theory; Data hiding models; Information theory; Survey; Watermarking theory

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; DATA REDUCTION; DIGITAL SIGNAL PROCESSING; DIGITAL WATERMARKING; INFORMATION THEORY;

EID: 0035767625     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.448206     Document Type: Conference Paper
Times cited : (38)

References (46)
  • 2
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • R. Anderson, ed., no. 1174 in Lecture Notes in Computer Science; May/June
    • I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia," in Proc. First Int. Workshop on Information Hiding, R. Anderson, ed., no. 1174 in Lecture Notes in Computer Science, pp. 185-206, May/June 1996.
    • (1996) Proc. First Int. Workshop on Information Hiding , pp. 185-206
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 7
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • July
    • I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE 87, pp. 1127-1141, July 1999.
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.L.3
  • 8
    • 0034441409 scopus 로고    scopus 로고
    • Informed embedding: Exploiting image and detector information during watermark insertion
    • September
    • M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," in Proc. IEEE Int. Conf. on Image Processing, vol. 3, pp. 1-4, September 2000.
    • (2000) Proc. IEEE Int. Conf. on Image Processing , vol.3 , pp. 1-4
    • Miller, M.L.1    Cox, I.J.2    Bloom, J.A.3
  • 12
    • 0032688251 scopus 로고    scopus 로고
    • Statistical analysis of watermarking schemes for copyright protection of images
    • July
    • J. R. Hernández and F. Pérez-González "Statistical analysis of watermarking schemes for copyright protection of images," Proceedings of the IEEE 87, pp. 1142-1166, July 1999.
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1142-1166
    • Hernández, J.R.1    Pérez-González, F.2
  • 13
    • 0033882559 scopus 로고    scopus 로고
    • Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure
    • January
    • J. R. Hernández, M. Amado, and F. Pérez-González, "Dct-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Transactions on Image Processing 9, pp. 55-68, January 2000.
    • (2000) IEEE Transactions on Image Processing , vol.9 , pp. 55-68
    • Hernández, J.R.1    Amado, M.2    Pérez-González, F.3
  • 14
    • 0035485860 scopus 로고    scopus 로고
    • Diversity and attack characterization for improved robust watermarking
    • October
    • D. Kundur and D. Hatzinakos, "Diversity and attack characterization for improved robust watermarking," IEEE Transactions on Signal Processing 29, October 2001.
    • (2001) IEEE Transactions on Signal Processing , vol.29
    • Kundur, D.1    Hatzinakos, D.2
  • 17
    • 0033686483 scopus 로고    scopus 로고
    • Fundamental performance limits of power-spectrum condition-compliant watermarks
    • January
    • J. K. Su, "Fundamental performance limits of power-spectrum condition-compliant watermarks," in Proc. SPIE: Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 314-325, January 2000.
    • (2000) Proc. SPIE: Security and Watermarking of Multimedia Contents II , vol.3971 , pp. 314-325
    • Su, J.K.1
  • 18
    • 0032073388 scopus 로고    scopus 로고
    • Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images
    • May
    • J. R. Hernández, F. Pérez-González, J. M. Rodríguez, and G. Nieto, "Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images," IEEE Journal on Select Areas in Communications 16, pp. 510-524, May 1998.
    • (1998) IEEE Journal on Select Areas in Communications , vol.16 , pp. 510-524
    • Hernández, J.R.1    Pérez-González, F.2    Rodríguez, J.M.3    Nieto, G.4
  • 27
    • 0003797254 scopus 로고
    • Transform coding of images
    • New York Academic
    • R. J. Clark, "Transform coding of images," New York Academic, 1985.
    • (1985)
    • Clark, R.J.1
  • 29
    • 0032629729 scopus 로고    scopus 로고
    • A bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries
    • June
    • J. J. K. Ó Ruanaidh and G. Csurka, "A bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries," in Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 207-212, June 1999.
    • (1999) Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition , vol.1 , pp. 207-212
    • Ruanaidh, J.J.K.O.1    Csurka, G.2
  • 32
    • 0033601648 scopus 로고    scopus 로고
    • Capacity of the watermark-channel: How many bits can be hidden within a digital image?
    • E. J. Delp and P. W. Wong, eds.; January
    • M. Barni, F. Bartolini, A. De Rosa, and A. Piva, "Capacity of the watermark-channel: How many bits can be hidden within a digital image?," in Proc. SPIE, Security and Watermarking of Multimedia Contents, E. J. Delp and P. W. Wong, eds., vol. 3657, pp. 437-448, January 1999.
    • (1999) Proc. SPIE, Security and Watermarking of Multimedia Contents , vol.3657 , pp. 437-448
    • Barni, M.1    Bartolini, F.2    De Rosa, A.3    Piva, A.4
  • 34
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods of digital watermarking and information embedding
    • May
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods of digital watermarking and information embedding," IEEE Transactions on Information Theory 47, pp. 1423-1443, May 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 35
    • 0034441357 scopus 로고    scopus 로고
    • Energy allocation principles for high capacity data hiding
    • September
    • D. Kundur, "Energy allocation principles for high capacity data hiding," in Proc. IEEE International Conference on Image Processing, vol. 1, pp. 423-426, September 2000.
    • (2000) Proc. IEEE International Conference on Image Processing , vol.1 , pp. 423-426
    • Kundur, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.