-
1
-
-
0032070303
-
On the limits of stenography
-
May
-
R. Anderson and F. Petitcolas, "On the limits of stenography," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 474-481, May 1998.
-
(1998)
IEEE J. Select. Areas Commun
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.1
Petitcolas, F.2
-
2
-
-
0032680807
-
Information hiding-A survey
-
Jul
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding-A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
3
-
-
0032625842
-
Watermarking as communications with side information
-
Jul
-
I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
4
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
Mar
-
P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.2
-
5
-
-
0034269888
-
Universal detection of messages via finite-state channels
-
Sep
-
N. Merhav, "Universal detection of messages via finite-state channels," IEEE Trans. Inf. Theory, vol. 46, no. 6, pp. 2242-2246, Sep. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.6
, pp. 2242-2246
-
-
Merhav, N.1
-
6
-
-
0142008347
-
Error exponents for watermarking game with squared-error constraints
-
Yokohama, Japan, Jun./Jul
-
T. Liu and P. Moulin, "Error exponents for watermarking game with squared-error constraints," in Proc. IEEE Int. Symp. Information Theory (ISIT'03), Yokohama, Japan, Jun./Jul. 2003, p. 190.
-
(2003)
Proc. IEEE Int. Symp. Information Theory (ISIT'03)
, pp. 190
-
-
Liu, T.1
Moulin, P.2
-
7
-
-
0141565031
-
Error exponents for one-bit watermarking
-
Apr
-
T. Liu and P. Moulin, "Error exponents for one-bit watermarking," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP'03), Apr. 2003, vol. 3, pp. 65-68.
-
(2003)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP'03)
, vol.3
, pp. 65-68
-
-
Liu, T.1
Moulin, P.2
-
8
-
-
33645660032
-
An Information-Theoretic View of Watermark Embedding-Detection and Geometric Attacks
-
presented at the, Barcelona, Spain, Jun, Online, Available
-
N. Merhav, "An Information-Theoretic View of Watermark Embedding-Detection and Geometric Attacks," presented at the WaCha'05, Barcelona, Spain, Jun. 2005 [Online]. Available: http://ww.ee.technion.ac.il/people/merhav/papers/p98.pdf
-
(2005)
WaCha'05
-
-
Merhav, N.1
-
9
-
-
0032634857
-
Multimedia watermarking techniques
-
Jul
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
10
-
-
0042648224
-
Modeling the false alarm and missed detection rate for electronic watermarks
-
Portland, OR, Apr
-
J. Linnartz, T. Kalker, and G. Depovere, "Modeling the false alarm and missed detection rate for electronic watermarks," in Information Hiding: Proc. 2nd Int. Workshop (IH'98), Portland, OR, Apr. 1998, p. 329.
-
(1998)
Information Hiding: Proc. 2nd Int. Workshop (IH'98)
, pp. 329
-
-
Linnartz, J.1
Kalker, T.2
Depovere, G.3
-
11
-
-
80055051483
-
Computing the probability of false watermark detection
-
London, U.K, Springer-Verlag
-
M. L. Miller and J. A. Bloom, "Computing the probability of false watermark detection," in IH'99: Proc. 3rd Int. Workshop on Information Hiding. London, U.K.: Springer-Verlag, 2000, pp. 146-158.
-
(2000)
IH'99: Proc. 3rd Int. Workshop on Information Hiding
, pp. 146-158
-
-
Miller, M.L.1
Bloom, J.A.2
-
12
-
-
0034441409
-
Informed embedding: Exploiting image and detector information during watermark insertion
-
Vancouver, BC, Canada
-
M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," in Proc. Int. Conf. Image Processing (ICIP'00), Vancouver, BC, Canada, 2000, vol. 3, pp. 1-4.
-
(2000)
Proc. Int. Conf. Image Processing (ICIP'00)
, vol.3
, pp. 1-4
-
-
Miller, M.L.1
Cox, I.J.2
Bloom, J.A.3
-
13
-
-
0035391983
-
Digital watermarking: Algorithms and applications
-
Jul
-
C. Podilchuk and E. Delp, "Digital watermarking: Algorithms and applications," IEEE Signal Process. Mag., vol. 18, no. 4, pp. 33-46, Jul. 2001.
-
(2001)
IEEE Signal Process. Mag
, vol.18
, Issue.4
, pp. 33-46
-
-
Podilchuk, C.1
Delp, E.2
-
15
-
-
0033601672
-
-
F. Hartung, J. Su, and B. Girod, Spread spectrum watermarking: Malicious attacks and counter-attacks, in Proce. SPIE 3657. Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, pp. 147-158.
-
F. Hartung, J. Su, and B. Girod, "Spread spectrum watermarking: Malicious attacks and counter-attacks," in Proce. SPIE vol. 3657. Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, pp. 147-158.
-
-
-
-
16
-
-
0038527410
-
Improved spread spectrum: A new modulation technique for robust watermarking
-
Apr
-
H. S. Malvar and D. A. F. Florêncio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.4
, pp. 898-905
-
-
Malvar, H.S.1
Florêncio, D.A.F.2
-
17
-
-
34249287362
-
A constructive and unifying framework for zero-bit water-marking
-
submitted for publication
-
T. Furon, "A constructive and unifying framework for zero-bit water-marking," IEEE Trans. Inf. Forensics Security, submitted for publication.
-
IEEE Trans. Inf. Forensics Security
-
-
Furon, T.1
-
18
-
-
0032688251
-
Statistical analysis of water-marking schemes for copyright protection of images
-
Jul
-
J. Hernandez and F. Perez-Gonzalez, "Statistical analysis of water-marking schemes for copyright protection of images," Proc. IEEE, vol. 87, no. 7, pp. 1142-1166, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1142-1166
-
-
Hernandez, J.1
Perez-Gonzalez, F.2
-
19
-
-
0024627211
-
Asymptotically optimal classification for multiple tests withempirically observed statistics
-
Mar
-
M. Gutman, "Asymptotically optimal classification for multiple tests withempirically observed statistics," IEEE Trans. Inf. Theory, vol. 35, no. 2, pp. 401-408, Mar. 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.2
, pp. 401-408
-
-
Gutman, M.1
-
20
-
-
0024733038
-
On the estimation of the order of a markov chain and universal datacompression
-
Sep
-
N. Merhav, M. Gutman, and J. Ziv, "On the estimation of the order of a markov chain and universal datacompression," IEEE Trans. Inf. Theory vol. 35, no. 5, pp. 1014-1019, Sep. 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.5
, pp. 1014-1019
-
-
Merhav, N.1
Gutman, M.2
Ziv, J.3
-
21
-
-
0026679656
-
Estimating the number of states of a finite-state source
-
Jan
-
N. Merhav, M. Gutman, and J. Ziv, "Estimating the number of states of a finite-state source," IEEE Trans. Inf. Theory, vol. 38, no. 1, pp. 61-65, Jan. 1992.
-
(1992)
IEEE Trans. Inf. Theory
, vol.38
, Issue.1
, pp. 61-65
-
-
Merhav, N.1
Gutman, M.2
Ziv, J.3
-
22
-
-
0037353685
-
On the error exponent and capacity games of private watermarking systems
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 537-562, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 537-562
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
23
-
-
1842481655
-
On the capacity game of public watermarking systems
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of public watermarking systems," IEEE Trans. Inf. Theory, vol. 50, no. 3, pp. 511-524, Mar. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.3
, pp. 511-524
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
24
-
-
38349193873
-
Optimal watermark embedding and detection strategies under limited detection resources
-
Seattle, WA, Jul
-
E. Sabbag and N. Merhav, "Optimal watermark embedding and detection strategies under limited detection resources," in Proc. IEEE Int. Symp. Information Theory (ISIT'06), Seattle, WA, Jul. 2006, pp. 173-177.
-
(2006)
Proc. IEEE Int. Symp. Information Theory (ISIT'06)
, pp. 173-177
-
-
Sabbag, E.1
Merhav, N.2
-
25
-
-
38349134680
-
Optimal watermark embedding and detection strategies under general worst case attacks
-
Nice, France, Jun
-
E. Sabbag and N. Merhav, "Optimal watermark embedding and detection strategies under general worst case attacks," in Proc. IEEE Int. Symp. Information Theory (ISIT'07), Nice, France, Jun. 2007, pp. 2446-2450.
-
(2007)
Proc. IEEE Int. Symp. Information Theory (ISIT'07)
, pp. 2446-2450
-
-
Sabbag, E.1
Merhav, N.2
-
28
-
-
13244256960
-
Effectiveness of exhaustive search and template matching against watermark desynchronization
-
Feb
-
M. Barni, "Effectiveness of exhaustive search and template matching against watermark desynchronization," IEEE Signal Process. Lett., vol. 12, no. 2, pp. 158-161, Feb. 2005.
-
(2005)
IEEE Signal Process. Lett
, vol.12
, Issue.2
, pp. 158-161
-
-
Barni, M.1
-
29
-
-
0024738041
-
On the estimation of the model order in exponential families
-
Sep
-
N. Merhav, "On the estimation of the model order in exponential families," IEEE Trans. Inf. Theory, vol. 35, no. 5, pp. 1109-1114, Sep. 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.5
, pp. 1109-1114
-
-
Merhav, N.1
-
30
-
-
0027629235
-
Universal decoding for memoryless gaussian channels with a deterministic interference
-
Jul
-
N. Merhav, "Universal decoding for memoryless gaussian channels with a deterministic interference," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1261-1269, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1261-1269
-
-
Merhav, N.1
-
31
-
-
0028549476
-
-
N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamaj (Shitz), On information rates for mismatched decoders, IEEE Trans. Inf. Theory 40, no. 6, pp. 1953-1967, Nov. 1994.
-
N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamaj (Shitz), "On information rates for mismatched decoders," IEEE Trans. Inf. Theory vol. 40, no. 6, pp. 1953-1967, Nov. 1994.
-
-
-
-
32
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
33
-
-
38349146025
-
A bound on the number of distinguishable functions which are time-limited and approximately band-limited
-
May
-
A. D. Wyner, "A bound on the number of distinguishable functions which are time-limited and approximately band-limited," SIAM J. Appl. Math., vol. 24, no. 3, pp. 289-297, May 1973.
-
(1973)
SIAM J. Appl. Math
, vol.24
, Issue.3
, pp. 289-297
-
-
Wyner, A.D.1
|