-
1
-
-
0032680807
-
"Information hiding - A survey"
-
Jul.
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
2
-
-
0032070303
-
"On the limits of stenography"
-
May
-
R. J. Anderson and F. A. P. Petitcolas, "On the limits of stenography," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474-481, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
3
-
-
0035416648
-
"Watermark embedding: Hiding a signal within a cover image"
-
Aug.
-
M. Barni, C. I. Podilchuk, F. Bartolini, and E. J. Delp, "Watermark embedding: Hiding a signal within a cover image," IEEE Commun. Mag., pp. 102-108, Aug. 2001.
-
(2001)
IEEE Commun. Mag.
, pp. 102-108
-
-
Barni, M.1
Podilchuk, C.I.2
Bartolini, F.3
Delp, E.J.4
-
4
-
-
0032095654
-
"Multimedia data-embedding and watermarking technologies"
-
Jun.
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," Proc. IEEE, vol. 86, no. 6, pp. 1064-1087, Jun. 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
5
-
-
0031362116
-
"Secure spread spectrum watermarking for multimedia"
-
Dec.
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
6
-
-
0001560154
-
"Channels with side information at the transmitter"
-
Oct.
-
C. E. Shannon, "Channels with side information at the transmitter," IBM J., pp. 289-293, Oct. 1958.
-
(1958)
IBM J.
, pp. 289-293
-
-
Shannon, C.E.1
-
7
-
-
0019148101
-
"Coding for channel with random parameters"
-
S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random parameters," Probl. Control Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
-
(1980)
Probl. Control Inf. Theory
, vol.9
, Issue.1
, pp. 19-31
-
-
Gel'Fand, S.I.1
Pinsker, M.S.2
-
8
-
-
0020752342
-
"Writing on dirty paper"
-
May
-
M. H. M. Costa, "Writing on dirty paper," IEEE Trans. Inf. Theory, vol. IT-29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
9
-
-
0032625842
-
"Watermarking as communications with side information"
-
Jul.
-
I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
10
-
-
0035334148
-
"Identification in the presence of side information with application to watermarking"
-
May
-
Y. Steinberg and N. Merhav, "Identification in the presence of side information with application to watermarking," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1410-1422, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1410-1422
-
-
Steinberg, Y.1
Merhav, N.2
-
11
-
-
0037353686
-
"Information-theoretic analysis of information hiding"
-
Mar.
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
12
-
-
0033871878
-
"On random coding error exponents of watermarking systems"
-
Mar.
-
N. Merhav, "On random coding error exponents of watermarking systems," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 420-430, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 420-430
-
-
Merhav, N.1
-
13
-
-
0036612282
-
"The Gaussian watermarking game"
-
Jun.
-
A. S. Cohen and A. Lapidoth, "The Gaussian watermarking game," IEEE Trans. Inf. Theory, vol. 48, no. 1, pp. 1639-1667, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.1
, pp. 1639-1667
-
-
Cohen, A.S.1
Lapidoth, A.2
-
14
-
-
0037353685
-
"On the error exponent and capacity games of private watermarking systems"
-
Mar.
-
A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 537-562, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 537-562
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
15
-
-
0037854454
-
"The duality between information embedding and source coding with side information and some applications"
-
May
-
R. J. Barron, B. Chen, and G. W. Wornell, "The duality between information embedding and source coding with side information and some applications," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1159-1179, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1159-1179
-
-
Barron, R.J.1
Chen, B.2
Wornell, G.W.3
-
16
-
-
23844495556
-
"Compression aware digital watermarking"
-
M.Sc. thesis, Dept. Elec. Eng., Tel-Aviv Univ., Tel-Aviv, Israel
-
L. Eshel, "Compression aware digital watermarking," M.Sc. thesis, Dept. Elec. Eng., Tel-Aviv Univ., Tel-Aviv, Israel, 2004.
-
(2004)
-
-
Eshel, L.1
-
17
-
-
33645248561
-
"Fingerprinting, watermarking and quantization of Gaussian data (Invited Talk)"
-
Monticello, IL, Oct. Also available [Online] at
-
D. Karakos and A. Papamarcou, "Fingerprinting, watermarking and quantization of Gaussian data (Invited Talk)," in Proc. 39th Allerton Conf. Communication, Control and Computing, Monticello, IL, Oct. 2001. Also available [Online] at http://www.isr.umd.edu/TechReports.
-
(2001)
Proc. 39th Allerton Conf. Communication, Control and Computing
-
-
Karakos, D.1
Papamarcou, A.2
-
18
-
-
0042265652
-
"A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks"
-
Aug.
-
D. Karakos and A. Papamarcou, "A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks," IEEE Trans. Inf. Theory, vol. 49, no. 8, pp. 1970-1982, Aug. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.8
, pp. 1970-1982
-
-
Karakos, D.1
Papamarcou, A.2
-
19
-
-
0042555104
-
"Digital watermarking, fingerprinting and compression: An information-theoretic perspective"
-
Ph.D. dissertation, Univ. Maryland, College Park, MD
-
D. Karakos, "Digital watermarking, fingerprinting and compression: An information-theoretic perspective," Ph.D. dissertation, Univ. Maryland, College Park, MD, 2002.
-
(2002)
-
-
Karakos, D.1
-
20
-
-
5044244454
-
"Reversible embedding methods"
-
Monticello, IL, Oct.
-
F. Willems and T. Kalker, "Reversible embedding methods," in Proc. 40th Allerton Conf. Communications Control and Computing, Monticello, IL, Oct. 2002, pp. 1462-1471.
-
(2002)
Proc. 40th Allerton Conf. Communications Control and Computing
, pp. 1462-1471
-
-
Willems, F.1
Kalker, T.2
-
21
-
-
17444379256
-
"On joint information embedding and lossy compression in the presence of a stationary memoryless attack channel"
-
to be published. Also, Tech. Rep., CCIT Pub. 464, EE Pub. 1408, Technion-Israel Inst. Technol., Haifa. Available [Online] at
-
A. Maor and N. Merhav, "On joint information embedding and lossy compression in the presence of a stationary memoryless attack channel," IEEE Trans. Inf. Theory, to be published. Also, Tech. Rep., CCIT Pub. 464, EE Pub. 1408, Technion-Israel Inst. Technol., Haifa. Available [Online] at http://www.ee.technion.ac.il/people/merhav/.
-
IEEE Trans. Inf. Theory
-
-
Maor, A.1
Merhav, N.2
-
25
-
-
0035333687
-
"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding"
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
26
-
-
13244252393
-
"Joint watermarking and compression using scalar quantization for maixmizing robustness in the presence of additive Gaussian attacks"
-
Feb.
-
G. Wu and E.-H. Yang, "Joint watermarking and compression using scalar quantization for maixmizing robustness in the presence of additive Gaussian attacks," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 834-844, Feb. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 834-844
-
-
Wu, G.1
Yang, E.-H.2
-
27
-
-
15044345755
-
"Capacity and codes for embedding information in gray-scale signals"
-
Mar.
-
F. Willems and M. van Dijk, "Capacity and codes for embedding information in gray-scale signals," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 1209-1214, Mar. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.3
, pp. 1209-1214
-
-
Willems, F.1
van Dijk, M.2
-
28
-
-
13244294848
-
"On Joint Information Embedding and Lossy Compression"
-
Tech. Rep., Technion-Israel Inst. Technol., Haifa, CCIT Pub. 450, EE Pub. 1391, Available [Online] at
-
A. Maor and N. Merhav, "On Joint Information Embedding and Lossy Compression," Tech. Rep., Technion-Israel Inst. Technol., Haifa, CCIT Pub. 450, EE Pub. 1391, 2003. Available [Online] at http://www.ee. technion.ac.il/people/merhav/.
-
(2003)
-
-
Maor, A.1
Merhav, N.2
|