메뉴 건너뛰기




Volumn 54, Issue 1, 2008, Pages 255-274

Optimal watermark embedding and detection strategies under limited detection resources

Author keywords

Detection; Error exponents; Hypothesis testing; Information embedding; Limited detection resources; Watermarking (WM)

Indexed keywords

ASYMPTOTIC ANALYSIS; GAUSSIAN DISTRIBUTION; PROBABILITY; SIGNAL DETECTION;

EID: 38349193395     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2007.911210     Document Type: Article
Times cited : (52)

References (35)
  • 1
  • 2
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding-A survey
    • Jul
    • F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding-A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.1    Anderson, R.2    Kuhn, M.3
  • 3
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • Jul
    • I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.L.3
  • 4
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Mar
    • P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.2
  • 5
    • 0034269888 scopus 로고    scopus 로고
    • Universal detection of messages via finite-state channels
    • Sep
    • N. Merhav, "Universal detection of messages via finite-state channels," IEEE Trans. Inf. Theory, vol. 46, no. 6, pp. 2242-2246, Sep. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.6 , pp. 2242-2246
    • Merhav, N.1
  • 6
    • 0142008347 scopus 로고    scopus 로고
    • Error exponents for watermarking game with squared-error constraints
    • Yokohama, Japan, Jun./Jul
    • T. Liu and P. Moulin, "Error exponents for watermarking game with squared-error constraints," in Proc. IEEE Int. Symp. Information Theory (ISIT'03), Yokohama, Japan, Jun./Jul. 2003, p. 190.
    • (2003) Proc. IEEE Int. Symp. Information Theory (ISIT'03) , pp. 190
    • Liu, T.1    Moulin, P.2
  • 8
    • 33645660032 scopus 로고    scopus 로고
    • An Information-Theoretic View of Watermark Embedding-Detection and Geometric Attacks
    • presented at the, Barcelona, Spain, Jun, Online, Available
    • N. Merhav, "An Information-Theoretic View of Watermark Embedding-Detection and Geometric Attacks," presented at the WaCha'05, Barcelona, Spain, Jun. 2005 [Online]. Available: http://ww.ee.technion.ac.il/people/merhav/papers/p98.pdf
    • (2005) WaCha'05
    • Merhav, N.1
  • 9
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • Jul
    • F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 11
    • 80055051483 scopus 로고    scopus 로고
    • Computing the probability of false watermark detection
    • London, U.K, Springer-Verlag
    • M. L. Miller and J. A. Bloom, "Computing the probability of false watermark detection," in IH'99: Proc. 3rd Int. Workshop on Information Hiding. London, U.K.: Springer-Verlag, 2000, pp. 146-158.
    • (2000) IH'99: Proc. 3rd Int. Workshop on Information Hiding , pp. 146-158
    • Miller, M.L.1    Bloom, J.A.2
  • 12
    • 0034441409 scopus 로고    scopus 로고
    • Informed embedding: Exploiting image and detector information during watermark insertion
    • Vancouver, BC, Canada
    • M. L. Miller, I. J. Cox, and J. A. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," in Proc. Int. Conf. Image Processing (ICIP'00), Vancouver, BC, Canada, 2000, vol. 3, pp. 1-4.
    • (2000) Proc. Int. Conf. Image Processing (ICIP'00) , vol.3 , pp. 1-4
    • Miller, M.L.1    Cox, I.J.2    Bloom, J.A.3
  • 13
    • 0035391983 scopus 로고    scopus 로고
    • Digital watermarking: Algorithms and applications
    • Jul
    • C. Podilchuk and E. Delp, "Digital watermarking: Algorithms and applications," IEEE Signal Process. Mag., vol. 18, no. 4, pp. 33-46, Jul. 2001.
    • (2001) IEEE Signal Process. Mag , vol.18 , Issue.4 , pp. 33-46
    • Podilchuk, C.1    Delp, E.2
  • 15
    • 0033601672 scopus 로고    scopus 로고
    • F. Hartung, J. Su, and B. Girod, Spread spectrum watermarking: Malicious attacks and counter-attacks, in Proce. SPIE 3657. Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, pp. 147-158.
    • F. Hartung, J. Su, and B. Girod, "Spread spectrum watermarking: Malicious attacks and counter-attacks," in Proce. SPIE vol. 3657. Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, pp. 147-158.
  • 16
    • 0038527410 scopus 로고    scopus 로고
    • Improved spread spectrum: A new modulation technique for robust watermarking
    • Apr
    • H. S. Malvar and D. A. F. Florêncio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.4 , pp. 898-905
    • Malvar, H.S.1    Florêncio, D.A.F.2
  • 17
    • 34249287362 scopus 로고    scopus 로고
    • A constructive and unifying framework for zero-bit water-marking
    • submitted for publication
    • T. Furon, "A constructive and unifying framework for zero-bit water-marking," IEEE Trans. Inf. Forensics Security, submitted for publication.
    • IEEE Trans. Inf. Forensics Security
    • Furon, T.1
  • 18
    • 0032688251 scopus 로고    scopus 로고
    • Statistical analysis of water-marking schemes for copyright protection of images
    • Jul
    • J. Hernandez and F. Perez-Gonzalez, "Statistical analysis of water-marking schemes for copyright protection of images," Proc. IEEE, vol. 87, no. 7, pp. 1142-1166, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1142-1166
    • Hernandez, J.1    Perez-Gonzalez, F.2
  • 19
    • 0024627211 scopus 로고
    • Asymptotically optimal classification for multiple tests withempirically observed statistics
    • Mar
    • M. Gutman, "Asymptotically optimal classification for multiple tests withempirically observed statistics," IEEE Trans. Inf. Theory, vol. 35, no. 2, pp. 401-408, Mar. 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.2 , pp. 401-408
    • Gutman, M.1
  • 20
    • 0024733038 scopus 로고
    • On the estimation of the order of a markov chain and universal datacompression
    • Sep
    • N. Merhav, M. Gutman, and J. Ziv, "On the estimation of the order of a markov chain and universal datacompression," IEEE Trans. Inf. Theory vol. 35, no. 5, pp. 1014-1019, Sep. 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.5 , pp. 1014-1019
    • Merhav, N.1    Gutman, M.2    Ziv, J.3
  • 21
    • 0026679656 scopus 로고
    • Estimating the number of states of a finite-state source
    • Jan
    • N. Merhav, M. Gutman, and J. Ziv, "Estimating the number of states of a finite-state source," IEEE Trans. Inf. Theory, vol. 38, no. 1, pp. 61-65, Jan. 1992.
    • (1992) IEEE Trans. Inf. Theory , vol.38 , Issue.1 , pp. 61-65
    • Merhav, N.1    Gutman, M.2    Ziv, J.3
  • 22
    • 0037353685 scopus 로고    scopus 로고
    • On the error exponent and capacity games of private watermarking systems
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 537-562, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 537-562
    • Somekh-Baruch, A.1    Merhav, N.2
  • 23
    • 1842481655 scopus 로고    scopus 로고
    • On the capacity game of public watermarking systems
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of public watermarking systems," IEEE Trans. Inf. Theory, vol. 50, no. 3, pp. 511-524, Mar. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.3 , pp. 511-524
    • Somekh-Baruch, A.1    Merhav, N.2
  • 24
    • 38349193873 scopus 로고    scopus 로고
    • Optimal watermark embedding and detection strategies under limited detection resources
    • Seattle, WA, Jul
    • E. Sabbag and N. Merhav, "Optimal watermark embedding and detection strategies under limited detection resources," in Proc. IEEE Int. Symp. Information Theory (ISIT'06), Seattle, WA, Jul. 2006, pp. 173-177.
    • (2006) Proc. IEEE Int. Symp. Information Theory (ISIT'06) , pp. 173-177
    • Sabbag, E.1    Merhav, N.2
  • 25
    • 38349134680 scopus 로고    scopus 로고
    • Optimal watermark embedding and detection strategies under general worst case attacks
    • Nice, France, Jun
    • E. Sabbag and N. Merhav, "Optimal watermark embedding and detection strategies under general worst case attacks," in Proc. IEEE Int. Symp. Information Theory (ISIT'07), Nice, France, Jun. 2007, pp. 2446-2450.
    • (2007) Proc. IEEE Int. Symp. Information Theory (ISIT'07) , pp. 2446-2450
    • Sabbag, E.1    Merhav, N.2
  • 28
    • 13244256960 scopus 로고    scopus 로고
    • Effectiveness of exhaustive search and template matching against watermark desynchronization
    • Feb
    • M. Barni, "Effectiveness of exhaustive search and template matching against watermark desynchronization," IEEE Signal Process. Lett., vol. 12, no. 2, pp. 158-161, Feb. 2005.
    • (2005) IEEE Signal Process. Lett , vol.12 , Issue.2 , pp. 158-161
    • Barni, M.1
  • 29
    • 0024738041 scopus 로고
    • On the estimation of the model order in exponential families
    • Sep
    • N. Merhav, "On the estimation of the model order in exponential families," IEEE Trans. Inf. Theory, vol. 35, no. 5, pp. 1109-1114, Sep. 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.5 , pp. 1109-1114
    • Merhav, N.1
  • 30
    • 0027629235 scopus 로고
    • Universal decoding for memoryless gaussian channels with a deterministic interference
    • Jul
    • N. Merhav, "Universal decoding for memoryless gaussian channels with a deterministic interference," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1261-1269, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1261-1269
    • Merhav, N.1
  • 31
    • 0028549476 scopus 로고    scopus 로고
    • N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamaj (Shitz), On information rates for mismatched decoders, IEEE Trans. Inf. Theory 40, no. 6, pp. 1953-1967, Nov. 1994.
    • N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamaj (Shitz), "On information rates for mismatched decoders," IEEE Trans. Inf. Theory vol. 40, no. 6, pp. 1953-1967, Nov. 1994.
  • 32
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 33
    • 38349146025 scopus 로고
    • A bound on the number of distinguishable functions which are time-limited and approximately band-limited
    • May
    • A. D. Wyner, "A bound on the number of distinguishable functions which are time-limited and approximately band-limited," SIAM J. Appl. Math., vol. 24, no. 3, pp. 289-297, May 1973.
    • (1973) SIAM J. Appl. Math , vol.24 , Issue.3 , pp. 289-297
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.