-
1
-
-
0003900894
-
-
Ph. D., Mass. Inst. Technol., Cambridge, MA
-
B. Chen, "Design and analysis of digital watermarking, information embedding, and data hiding systems, " Ph. D., Mass. Inst. Technol., Cambridge, MA, 2000.
-
(2000)
Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems
-
-
Chen, B.1
-
2
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, " IEEE Trans. Inf. Theory, vol. 47, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
3
-
-
0032070303
-
On the limitsofsteganography
-
May
-
R. J. Anderson and F. A. P. Petitcolas, "On the limitsofsteganography, " IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474-484, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 474-484
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
4
-
-
31344436558
-
Multimedia dataembedding and watermarking technologies
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia dataembedding and watermarking technologies, " in Proc. IEEE Int. Conf. Commun. (ICC), 1998, vol. 2, pp. 823-827.
-
(1998)
Proc. IEEE Int. Conf. Commun. (ICC)
, vol.2
, pp. 823-827
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
5
-
-
0019148101
-
Coding for channel with random parameters
-
S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random parameters, " Probl. Contr. Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
-
(1980)
Probl. Contr. Inf. Theory
, vol.9
, Issue.1
, pp. 19-31
-
-
Gel'fand, S.I.1
Pinsker, M.S.2
-
6
-
-
0020752342
-
Writing on dirty paper
-
May
-
M. H. M. Costa, "Writing on dirty paper, " IEEE Trans. Inf. Theory, vol. IT-29, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, pp. 439-441
-
-
Costa, M.H.M.1
-
7
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
P. Moulin and J. O'Sullivan, "Information-theoretic analysis of information hiding, " IEEE Trans. Inf. Theory, vol. 49, pp. 563-593, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.2
-
8
-
-
0036612282
-
The Gaussian watermarking game
-
Jun
-
A. S. Cohen and A. Lapidoth, "The Gaussian watermarking game, " IEEE Trans. Inf. Theory, vol. 48, pp. 1639-1669, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, pp. 1639-1669
-
-
Cohen, A.S.1
Lapidoth, A.2
-
11
-
-
0037353685
-
On the error exponent and capacity games of private watermarking systems
-
mar
-
A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems, " IEEE Trans. Inf. Theory, vol. 49, pp. 537-562, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 537-562
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
12
-
-
1842481655
-
On the capacity game of public watermarking system
-
mar
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of public watermarking system, " IEEE Trans. Inf. Theory, vol. 50, pp. 511-524, Mar. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, pp. 511-524
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
13
-
-
15044340426
-
On the capacity game of private fingerprinting systems under collusion attacks
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks, " IEEE Trans. Inf. Theory, vol. 51, pp. 884-899, Mar.. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, pp. 884-899
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
14
-
-
23844495277
-
On joint information embedding and lossy compression
-
Aug
-
A. Maor and N. Merhav, "On joint information embedding and lossy compression, " IEEE Trans. Inf. Theory, vol. 51, pp. 2998-3008, Aug. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, pp. 2998-3008
-
-
Maor, A.1
Merhav, N.2
-
15
-
-
26444462495
-
On joint information embedding and lossy compression in the presence of a memoryless attack
-
A. Maor and N. Merhav, "On joint information embedding and lossy compression in the presence of a memoryless attack, " IEEE Trans. Inf. Theory, vol. 51, pp. 3166-3175, 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, pp. 3166-3175
-
-
Maor, A.1
Merhav, N.2
-
16
-
-
33144467852
-
On joint coding for watermarking and encryption
-
Jan
-
N. Merhav, "On joint coding for watermarking and encryption, " IEEE Trans. Inf. Theory, vol. 52, pp. 190-205, Jan. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, pp. 190-205
-
-
Merhav, N.1
-
18
-
-
5044250503
-
Multiple user writing on dirty paper
-
Chicago, IL, Jun. 27-Jul. 2
-
Y. H. Kim, A. Sutivong, and S. Sigurjónsson, "Multiple user writing on dirty paper, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Chicago, IL, Jun. 27-Jul. 2, 2004.
-
(2004)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
-
-
Kim, Y.H.1
Sutivong, A.2
Sigurjónsson, S.3
-
19
-
-
5044247134
-
Writing on many pieces of dirty paper at once: The binary case
-
Chicago, IL, Jun. 27-Jul. 2
-
A. Khisti, U. Erez, and G. W. Wornell, "Writing on many pieces of dirty paper at once: The binary case, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Chicago, IL, Jun. 27-Jul. 2, 2004.
-
(2004)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
-
-
Khisti, A.1
Erez, U.2
Wornell, G.W.3
-
20
-
-
21844461783
-
Achievable rates for multiple access channels with state information known at one encoder
-
Monticello, IL
-
S. Kotagiri and J. N. Laneman, "Achievable rates for multiple access channels with state information known at one encoder, " in Proc. Allerton Conf. Commun., Control, Comput., Monticello, IL, 2004.
-
(2004)
Proc. Allerton Conf. Commun., Control, Comput.
-
-
Kotagiri, S.1
Laneman, J.N.2
-
21
-
-
23844437377
-
Coding for the degraded broadcast channel with random parameters, with causal and noncausal side information
-
Aug
-
Y. Steinberg, "Coding for the degraded broadcast channel with random parameters, with causal and noncausal side information, " IEEE Trans. Inf. Theory, vol. 51, pp. 2867-2877, Aug. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, pp. 2867-2877
-
-
Steinberg, Y.1
-
22
-
-
27744514549
-
Multiple access channel with partial state information at the encoders
-
Nov
-
Y. Cemal and Y. Steinberg, "Multiple access channel with partial state information at the encoders, " IEEE Trans. Inf. Theory, vol. IT-51, pp. 3992-4003, Nov. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.IT-51
, pp. 3992-4003
-
-
Cemal, Y.1
Steinberg, Y.2
-
23
-
-
33947397919
-
Capacity with causal and noncausal side information - A unified view
-
Dec
-
S. A. Jafar, "Capacity with causal and noncausal side information - A unified view, " IEEE Trans. Inf. Theory, vol. 52, pp. 5468-5475, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, pp. 5468-5475
-
-
Jafar, S.A.1
-
24
-
-
43949145631
-
Multiple access channels with state information known at some encoders
-
Article ID 450680
-
S. Kotagiri and J. N. Laneman, "Multiple access channels with state information known at some encoders, " EURASIP J. Wireless Commun. Netw., vol. 2008, no. Article ID 450680, p. 14, 2008.
-
(2008)
EURASIP J. Wireless Commun. Netw.
, vol.2008
, Issue.ARTICLE ID 450680
, pp. 14
-
-
Kotagiri, S.1
Laneman, J.N.2
-
25
-
-
84940654829
-
Cooperative encoding with asymmetric state information atthe transmitters
-
A. Somekh-Baruch, S. Shamai, and S. Verdu, "Cooperative encoding with asymmetric state information atthe transmitters, " in Proc. Allerton Conf. Commun., Control, Comput., 2006.
-
(2006)
Proc. Allerton Conf. Commun., Control, Comput.
-
-
Somekh-Baruch, A.1
Shamai, S.2
Verdu, S.3
-
26
-
-
51649130024
-
Multiaccess channels with state known to one encoder: A case of degraded message sets
-
Nice, France, Jun. 24-29
-
S. Kotagiri and J. N. Laneman, "Multiaccess channels with state known to one encoder: A case of degraded message sets, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice, France, Jun. 24-29, 2007.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
-
-
Kotagiri, S.1
Laneman, J.N.2
-
27
-
-
51649120607
-
Cooperative multiple access encoding with states available at one transmitter
-
Nice, France, Jun. 24-29
-
A. Somekh-Baruch, S. Shamai, and S. Verdu, "Cooperative multiple access encoding with states available at one transmitter, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice, France, Jun. 24-29, 2007.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
-
-
Somekh-Baruch, A.1
Shamai, S.2
Verdu, S.3
-
28
-
-
39049166228
-
Reversible information embedding with compressed hosts at the decoder
-
Seattle, WA, Jul. 9-14
-
Y. Steinberg, "Reversible information embedding with compressed hosts at the decoder, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Seattle, WA, Jul. 9-14, 2006.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
-
-
Steinberg, Y.1
-
29
-
-
13244295121
-
On achievable regions of public multiple-access Gaussian watermarking systems
-
Berlin, Heidelberg: Springer, Lecture Notes in Comput. Sci.
-
W. Sun and E. Yang, "On achievable regions of public multiple-access Gaussian watermarking systems, " in Information Hiding. Berlin, Heidelberg: Springer, 2004, Lecture Notes in Comput. Sci., pp. 38-51.
-
(2004)
Information Hiding
, pp. 38-51
-
-
Sun, W.1
Yang, E.2
-
32
-
-
4243798787
-
-
Ph. D. dissertation, Cornell Univ., Ithaca, NY
-
S. Tung, "Multiterminal source coding, " Ph. D. dissertation, Cornell Univ., Ithaca, NY, 1978.
-
(1978)
Multiterminal source coding
-
-
Tung, S.1
-
33
-
-
52349090526
-
On the public information embedding capacity region under multiple access attacks
-
Toronto, ON, Canada, Jul. 6-11
-
Y. Zhong, Y. Wang, F. Alajaji, and T. Linder, "On the Public Information Embedding Capacity Region Under Multiple Access Attacks, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Toronto, ON, Canada, Jul. 6-11, 2008.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
-
-
Zhong, Y.1
Wang, Y.2
Alajaji, F.3
Linder, T.4
-
34
-
-
77951536054
-
Inner and outer bounds for the public information embedding capacity region under multiple access attacks
-
Department of Mathematics and Statistics, Queens University, Kingston, Canada, Online. Available
-
Y. Zhong, Y. Wang, F. Alajaji, and T. Linder, "Inner and Outer Bounds for the Public Information Embedding Capacity Region Under Multiple Access Attacks, " Mathematics and Engineering Tech. Rep., Department of Mathematics and Statistics, Queens University, Kingston, Canada [Online]. Available: http://www.mast.queensu.ca/~fady/TR/TR10-embed-mac-cap. pdf.
-
Mathematics and Engineering Tech. Rep.
-
-
Zhong, Y.1
Wang, Y.2
Alajaji, F.3
Linder, T.4
|