메뉴 건너뛰기




Volumn 56, Issue 5, 2010, Pages 2225-2240

Variations on information embedding in multiple access and broadcast channels

Author keywords

Broadcast channels; Information embedding; Irreversible information embedding; Multiple access channels; Reversible information embedding

Indexed keywords

BROADCAST CHANNELS; CAPACITY REGIONS; DEGRADED BROADCAST CHANNEL; EMBEDDED MESSAGES; EMBEDDED SIGNALS; EMBEDDING METHOD; HOST SIGNALS; INFORMATION EMBEDDING; LOSSLESS; MULTIPLE ACCESS; MULTIPLE ACCESS CHANNELS; OUTER BOUNDS;

EID: 77951585908     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2010.2043771     Document Type: Article
Times cited : (3)

References (34)
  • 2
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, " IEEE Trans. Inf. Theory, vol. 47, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 5
    • 0019148101 scopus 로고
    • Coding for channel with random parameters
    • S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random parameters, " Probl. Contr. Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
    • (1980) Probl. Contr. Inf. Theory , vol.9 , Issue.1 , pp. 19-31
    • Gel'fand, S.I.1    Pinsker, M.S.2
  • 6
    • 0020752342 scopus 로고
    • Writing on dirty paper
    • May
    • M. H. M. Costa, "Writing on dirty paper, " IEEE Trans. Inf. Theory, vol. IT-29, pp. 439-441, May 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.IT-29 , pp. 439-441
    • Costa, M.H.M.1
  • 7
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding, " IEEE Trans. Inf. Theory, vol. 49, pp. 563-593, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.2
  • 8
    • 0036612282 scopus 로고    scopus 로고
    • The Gaussian watermarking game
    • Jun
    • A. S. Cohen and A. Lapidoth, "The Gaussian watermarking game, " IEEE Trans. Inf. Theory, vol. 48, pp. 1639-1669, Jun. 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , pp. 1639-1669
    • Cohen, A.S.1    Lapidoth, A.2
  • 9
  • 11
    • 0037353685 scopus 로고    scopus 로고
    • On the error exponent and capacity games of private watermarking systems
    • mar
    • A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems, " IEEE Trans. Inf. Theory, vol. 49, pp. 537-562, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , pp. 537-562
    • Somekh-Baruch, A.1    Merhav, N.2
  • 12
    • 1842481655 scopus 로고    scopus 로고
    • On the capacity game of public watermarking system
    • mar
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of public watermarking system, " IEEE Trans. Inf. Theory, vol. 50, pp. 511-524, Mar. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , pp. 511-524
    • Somekh-Baruch, A.1    Merhav, N.2
  • 13
    • 15044340426 scopus 로고    scopus 로고
    • On the capacity game of private fingerprinting systems under collusion attacks
    • Mar
    • A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks, " IEEE Trans. Inf. Theory, vol. 51, pp. 884-899, Mar.. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , pp. 884-899
    • Somekh-Baruch, A.1    Merhav, N.2
  • 14
    • 23844495277 scopus 로고    scopus 로고
    • On joint information embedding and lossy compression
    • Aug
    • A. Maor and N. Merhav, "On joint information embedding and lossy compression, " IEEE Trans. Inf. Theory, vol. 51, pp. 2998-3008, Aug. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , pp. 2998-3008
    • Maor, A.1    Merhav, N.2
  • 15
    • 26444462495 scopus 로고    scopus 로고
    • On joint information embedding and lossy compression in the presence of a memoryless attack
    • A. Maor and N. Merhav, "On joint information embedding and lossy compression in the presence of a memoryless attack, " IEEE Trans. Inf. Theory, vol. 51, pp. 3166-3175, 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , pp. 3166-3175
    • Maor, A.1    Merhav, N.2
  • 16
    • 33144467852 scopus 로고    scopus 로고
    • On joint coding for watermarking and encryption
    • Jan
    • N. Merhav, "On joint coding for watermarking and encryption, " IEEE Trans. Inf. Theory, vol. 52, pp. 190-205, Jan. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , pp. 190-205
    • Merhav, N.1
  • 19
    • 5044247134 scopus 로고    scopus 로고
    • Writing on many pieces of dirty paper at once: The binary case
    • Chicago, IL, Jun. 27-Jul. 2
    • A. Khisti, U. Erez, and G. W. Wornell, "Writing on many pieces of dirty paper at once: The binary case, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Chicago, IL, Jun. 27-Jul. 2, 2004.
    • (2004) Proc. IEEE Int. Symp. Inf. Theory (ISIT)
    • Khisti, A.1    Erez, U.2    Wornell, G.W.3
  • 20
    • 21844461783 scopus 로고    scopus 로고
    • Achievable rates for multiple access channels with state information known at one encoder
    • Monticello, IL
    • S. Kotagiri and J. N. Laneman, "Achievable rates for multiple access channels with state information known at one encoder, " in Proc. Allerton Conf. Commun., Control, Comput., Monticello, IL, 2004.
    • (2004) Proc. Allerton Conf. Commun., Control, Comput.
    • Kotagiri, S.1    Laneman, J.N.2
  • 21
    • 23844437377 scopus 로고    scopus 로고
    • Coding for the degraded broadcast channel with random parameters, with causal and noncausal side information
    • Aug
    • Y. Steinberg, "Coding for the degraded broadcast channel with random parameters, with causal and noncausal side information, " IEEE Trans. Inf. Theory, vol. 51, pp. 2867-2877, Aug. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , pp. 2867-2877
    • Steinberg, Y.1
  • 22
    • 27744514549 scopus 로고    scopus 로고
    • Multiple access channel with partial state information at the encoders
    • Nov
    • Y. Cemal and Y. Steinberg, "Multiple access channel with partial state information at the encoders, " IEEE Trans. Inf. Theory, vol. IT-51, pp. 3992-4003, Nov. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.IT-51 , pp. 3992-4003
    • Cemal, Y.1    Steinberg, Y.2
  • 23
    • 33947397919 scopus 로고    scopus 로고
    • Capacity with causal and noncausal side information - A unified view
    • Dec
    • S. A. Jafar, "Capacity with causal and noncausal side information - A unified view, " IEEE Trans. Inf. Theory, vol. 52, pp. 5468-5475, Dec. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , pp. 5468-5475
    • Jafar, S.A.1
  • 24
    • 43949145631 scopus 로고    scopus 로고
    • Multiple access channels with state information known at some encoders
    • Article ID 450680
    • S. Kotagiri and J. N. Laneman, "Multiple access channels with state information known at some encoders, " EURASIP J. Wireless Commun. Netw., vol. 2008, no. Article ID 450680, p. 14, 2008.
    • (2008) EURASIP J. Wireless Commun. Netw. , vol.2008 , Issue.ARTICLE ID 450680 , pp. 14
    • Kotagiri, S.1    Laneman, J.N.2
  • 26
    • 51649130024 scopus 로고    scopus 로고
    • Multiaccess channels with state known to one encoder: A case of degraded message sets
    • Nice, France, Jun. 24-29
    • S. Kotagiri and J. N. Laneman, "Multiaccess channels with state known to one encoder: A case of degraded message sets, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice, France, Jun. 24-29, 2007.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory (ISIT)
    • Kotagiri, S.1    Laneman, J.N.2
  • 27
    • 51649120607 scopus 로고    scopus 로고
    • Cooperative multiple access encoding with states available at one transmitter
    • Nice, France, Jun. 24-29
    • A. Somekh-Baruch, S. Shamai, and S. Verdu, "Cooperative multiple access encoding with states available at one transmitter, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice, France, Jun. 24-29, 2007.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory (ISIT)
    • Somekh-Baruch, A.1    Shamai, S.2    Verdu, S.3
  • 28
    • 39049166228 scopus 로고    scopus 로고
    • Reversible information embedding with compressed hosts at the decoder
    • Seattle, WA, Jul. 9-14
    • Y. Steinberg, "Reversible information embedding with compressed hosts at the decoder, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Seattle, WA, Jul. 9-14, 2006.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory (ISIT)
    • Steinberg, Y.1
  • 29
    • 13244295121 scopus 로고    scopus 로고
    • On achievable regions of public multiple-access Gaussian watermarking systems
    • Berlin, Heidelberg: Springer, Lecture Notes in Comput. Sci.
    • W. Sun and E. Yang, "On achievable regions of public multiple-access Gaussian watermarking systems, " in Information Hiding. Berlin, Heidelberg: Springer, 2004, Lecture Notes in Comput. Sci., pp. 38-51.
    • (2004) Information Hiding , pp. 38-51
    • Sun, W.1    Yang, E.2
  • 32
    • 4243798787 scopus 로고
    • Ph. D. dissertation, Cornell Univ., Ithaca, NY
    • S. Tung, "Multiterminal source coding, " Ph. D. dissertation, Cornell Univ., Ithaca, NY, 1978.
    • (1978) Multiterminal source coding
    • Tung, S.1
  • 33
    • 52349090526 scopus 로고    scopus 로고
    • On the public information embedding capacity region under multiple access attacks
    • Toronto, ON, Canada, Jul. 6-11
    • Y. Zhong, Y. Wang, F. Alajaji, and T. Linder, "On the Public Information Embedding Capacity Region Under Multiple Access Attacks, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Toronto, ON, Canada, Jul. 6-11, 2008.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory (ISIT)
    • Zhong, Y.1    Wang, Y.2    Alajaji, F.3    Linder, T.4
  • 34
    • 77951536054 scopus 로고    scopus 로고
    • Inner and outer bounds for the public information embedding capacity region under multiple access attacks
    • Department of Mathematics and Statistics, Queens University, Kingston, Canada, Online. Available
    • Y. Zhong, Y. Wang, F. Alajaji, and T. Linder, "Inner and Outer Bounds for the Public Information Embedding Capacity Region Under Multiple Access Attacks, " Mathematics and Engineering Tech. Rep., Department of Mathematics and Statistics, Queens University, Kingston, Canada [Online]. Available: http://www.mast.queensu.ca/~fady/TR/TR10-embed-mac-cap. pdf.
    • Mathematics and Engineering Tech. Rep.
    • Zhong, Y.1    Wang, Y.2    Alajaji, F.3    Linder, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.