메뉴 건너뛰기




Volumn 6072, Issue , 2006, Pages

Secret dither estimation in lattice-quantization data hiding: A set-membership approach

Author keywords

DC DM; Lattice data hiding; Residual entropy; Security; Set membership estimation

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; DIGITAL WATERMARKING; EMBEDDED SYSTEMS; INFORMATION ANALYSIS; MEMBERSHIP FUNCTIONS; SECURITY SYSTEMS; SET THEORY;

EID: 33645670509     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.642688     Document Type: Conference Paper
Times cited : (3)

References (17)
  • 2
    • 33746628959 scopus 로고    scopus 로고
    • Fundamentals of data hiding security and their application to spread-spectrum analysis
    • 7th Information Hiding Workshop, IH05, M. Barni, J. Herrera-Joancomartf, S. Katzenbeisser, and F. Pérez-González, eds., Springer Verlag, (Barcelona, Spain), June
    • P. Comesaña, L. Pérez-Freire, and F. Pérez- González, "Fundamentals of data hiding security and their application to spread-spectrum analysis," in 7th Information Hiding Workshop, IH05, M. Barni, J. Herrera-Joancomartf, S. Katzenbeisser, and F. Pérez-González, eds., Lecture Notes in Computer Science 3727, pp. 146-160, Springer Verlag, (Barcelona, Spain), June 2005.
    • (2005) Lecture Notes in Computer Science , vol.3727 , pp. 146-160
    • Comesaña, P.1    Pérez-Freire, L.2    Pérez-González, F.3
  • 3
    • 0035333687 scopus 로고    scopus 로고
    • Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell, "Quantization Index Modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory 47, pp. 1423-1443, May 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 4
    • 0037737759 scopus 로고    scopus 로고
    • Scalar Costa Scheme for information embedding
    • April Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
    • J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar Costa Scheme for information embedding," IEEE Transactions on Signal Processing 51, pp. 1003-1019, April 2003. Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , pp. 1003-1019
    • Eggers, J.J.1    Bäuml, R.2    Tzschoppe, R.3    Girod, B.4
  • 5
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • October
    • C. E. Shannon, "Communication theory of secrecy systems," Bell system technical journal 28, pp. 656-715, October 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 33646182858 scopus 로고    scopus 로고
    • Security of DM quantization watermarking schemes: A practical study for digital images
    • M. Barni, I. Cox, T. Kalker, and H. J. Kim, eds., Springer, (Siena, Italy), September
    • P. Bas and J. Hurri, "Security of DM quantization watermarking schemes: a practical study for digital images," in Fourth International Workshop on Digital Watermarking, M. Barni, I. Cox, T. Kalker, and H. J. Kim, eds., 3710, pp. 186-200, Springer, (Siena, Italy), September 2005.
    • (2005) Fourth International Workshop on Digital Watermarking , vol.3710 , pp. 186-200
    • Bas, P.1    Hurri, J.2
  • 7
    • 5144221013 scopus 로고    scopus 로고
    • Achieving 1/2log(1+SNR) over the additive white Gaussian noise channel with lattice encoding and decoding
    • October
    • U. Erez and R. Zamir, "Achieving 1/2log(1+SNR) over the Additive White Gaussian Noise Channel with Lattice Encoding and Decoding," IEEE Transactions on Information Theory 50, pp. 2293-2314, October 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , pp. 2293-2314
    • Erez, U.1    Zamir, R.2
  • 11
    • 33746637553 scopus 로고    scopus 로고
    • Information-theoretic analysis of security in side-informed data hiding
    • 7th Information Hiding Workshop, IH05, M. Barni, J. Herrera- Joancomartí, S. Katzenbeisser, and F. Pérez-González, eds., Springer Verlag, (Barcelona, Spain), June
    • L. Pérez-Freire, P. Comesaña, and F. Pérez- González, "Information-theoretic analysis of security in side-informed data hiding," in 7th Information Hiding Workshop, IH05, M. Barni, J. Herrera-Joancomartí, S. Katzenbeisser, and F. Pérez-González, eds., Lecture Notes in Computer Science 3727, pp. 131-145, Springer Verlag, (Barcelona, Spain), June 2005.
    • (2005) Lecture Notes in Computer Science , vol.3727 , pp. 131-145
    • Pérez-Freire, L.1    Comesaña, P.2    Pérez-González, F.3
  • 12
    • 0004055894 scopus 로고    scopus 로고
    • SIAM Studies in Applied Mathematics, Cambridge University Press, Cambridge, UK
    • 12. S. Boyd and L. Vandenberghe, Convex optimization, SIAM Studies in Applied Mathematics, Cambridge University Press, Cambridge, UK, 2004.
    • (2004) Convex Optimization
    • Boyd, S.1    Vandenberghe, L.2
  • 13
    • 0026258792 scopus 로고
    • Optimal estimation theory for dynamic systems with set membership uncertainty: An overview
    • M. Milanese and A. Vicino, "Optimal estimation theory for dynamic systems with set membership uncertainty: an overview," Automatica 27(6), pp. 997-1009, 1991.
    • (1991) Automatica , vol.27 , Issue.6 , pp. 997-1009
    • Milanese, M.1    Vicino, A.2
  • 14
  • 15
    • 20344396845 scopus 로고    scopus 로고
    • YALMIP: A toolbox for modeling and optimization in MATLAB
    • (Taipei, Taiwan)
    • J. Löfberg, "YALMIP: A toolbox for modeling and optimization in MATLAB," in Proceedings of the CACSD Conference, (Taipei, Taiwan), 2004. Available from http://control.ee.ethz.ch/~joloef/yalmip.php.
    • (2004) Proceedings of the CACSD Conference
    • Löfberg, J.1
  • 16
    • 0033296299 scopus 로고    scopus 로고
    • Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
    • Version 1.1
    • J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones.," Optimization methods and software 11-12(1-4), pp. 625-653, 1999. Version 1.1 available from http://sedumi.mcmaster.ca/.
    • (1999) Optimization Methods and Software , vol.11-12 , Issue.1-4 , pp. 625-653
    • Sturm, J.F.1
  • 17
    • 0020098638 scopus 로고
    • Voronoi regions of lattices, second moments of polytopes, and quantization
    • March
    • J. H. Conway and N. J. A. Sloane, "Voronoi regions of lattices, second moments of polytopes, and quantization," IEEE Transactions on Information Theory 28, pp. 211-226, March 1982.
    • (1982) IEEE Transactions on Information Theory , vol.28 , pp. 211-226
    • Conway, J.H.1    Sloane, N.J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.