메뉴 건너뛰기




Volumn 52, Issue 1, 2006, Pages 190-205

On joint coding for watermarking and encryption

Author keywords

Data compression; Encryption; Equivocation; Information hiding; Rate distortion; Separation principle; Side information; Watermarking

Indexed keywords

CRYPTOGRAPHY; DATA COMPRESSION; DIGITAL WATERMARKING; EMBEDDED SYSTEMS; SIGNAL DISTORTION;

EID: 33144467852     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2005.860427     Document Type: Article
Times cited : (25)

References (19)
  • 1
    • 33144481699 scopus 로고    scopus 로고
    • Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure
    • Preprint. Online Available at www-krypt.cs.uni-sb.de/download/papers
    • A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi. Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure. Preprint 2002. Online Available at www-krypt.cs.uni-sb.de/ download/papers
    • (2002)
    • Adelsbach, A.1    Katzenbeisser, S.2    Sadeghi, A.-R.3
  • 5
    • 0019148101 scopus 로고
    • "Coding for channel with random parameters"
    • S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random parameters," Probl. Inf. Control, vol. 9, no. 1, pp. 19-31, 1980.
    • (1980) Probl. Inf. Control , vol.9 , Issue.1 , pp. 19-31
    • Gel'fand, S.I.1    Pinsker, M.S.2
  • 6
    • 33144455562 scopus 로고    scopus 로고
    • Embedding multiresolution binary images into multiresolution watermark channels in wavelet domain
    • Preprint. Online. Available: www.tsi.enst.fr/~maitre/tatouage/icassp00/ articles
    • A. Jayawardena, B. Murison, and P. Lenders. Embedding multiresolution binary images into multiresolution watermark channels in wavelet domain. Preprint 2000. Online. Available: Www.tsi.enst.fr/~maitre/tatouage/ icassp00/articles
    • (2000)
    • Jayawardena, A.1    Murison, B.2    Lenders, P.3
  • 8
    • 1842422535 scopus 로고    scopus 로고
    • "A digital watermark using public-key cryptography for open algorithm"
    • Also Available Online
    • K. Kuroda, M. Nishigaki, M. Soga, A. Takubo, and I. Nakamura, "A digital watermark using public-key cryptography for open algorithm," in Proc. ICITA 2002, Also Available Online: http://charybdis.mit.csu.edu.au/~mantolov/CD/ICITA2002/papers/131-21.pdf.
    • Proc. ICITA 2002
    • Kuroda, K.1    Nishigaki, M.2    Soga, M.3    Takubo, A.4    Nakamura, I.5
  • 9
    • 23844495277 scopus 로고    scopus 로고
    • "On joint information embedding and lossy compression"
    • Aug
    • A. Maor and N. Merhav, "On joint information embedding and lossy compression," IEEE Trans. Inf. Theory, vol. 51, no. 8, pp. 2998-3008, Aug. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.8 , pp. 2998-3008
    • Maor, A.1    Merhav, N.2
  • 10
    • 26444462495 scopus 로고    scopus 로고
    • "On joint information embedding and lossy compression in the presence of a stationary memoryless attack channel"
    • Sep
    • A. Maor and N. Merhav, "On joint information embedding and lossy compression in the presence of a stationary memoryless attack channel," IEEE Trans. Inf. Theory, vol. 51, no. 9, pp. 3166-3175, Sep. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.9 , pp. 3166-3175
    • Maor, A.1    Merhav, N.2
  • 11
    • 33947367439 scopus 로고    scopus 로고
    • "On the Shannon cipher system with a capacity-limited keydistribution channel"
    • submitted for publication
    • N. Merhav, "On the Shannon cipher system with a capacity-limited keydistribution channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Merhav, N.1
  • 12
    • 0344012629 scopus 로고    scopus 로고
    • "On joint source-channel coding for the Wyner-Ziv source and the Gel'fand-Pinsker channel"
    • (Shitz), Nov
    • N. Merhav and S. Shamai (Shitz), "On joint source-channel coding for the Wyner-Ziv source and the Gel'fand-Pinsker channel," IEEE Trans. Inf. Theory, vol. 49, no. 11, pp. 2844-2855, Nov. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.11 , pp. 2844-2855
    • Merhav, N.1    Shamai, S.2
  • 13
    • 0037353686 scopus 로고    scopus 로고
    • "Information-theoretic analysis of information hiding"
    • Mar
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 15
    • 0015648934 scopus 로고
    • "Noiseless coding of correlated information sources"
    • Jul
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 17
    • 0028425695 scopus 로고
    • "Channel simulation and coding with side information"
    • May
    • Y. Steinberg and S. Verdú, "Channel simulation and coding with side information," IEEE Trans. Inf. Theory, vol. 40, no. 3, pp. 634-646, May 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.3 , pp. 634-646
    • Steinberg, Y.1    Verdú, S.2
  • 18
    • 0016562514 scopus 로고
    • "The wire-tap channel"
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 19
    • 0031143282 scopus 로고    scopus 로고
    • "Rate-distortion theory for the Shannon cipher system"
    • May
    • H. Yamamoto, "Rate-distortion theory for the Shannon cipher system," IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.3 , pp. 827-835
    • Yamamoto, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.