Sciweavers

21 search results - page 1 / 5
» Fundamentals of Data Hiding Security and Their Application t...
Sort
View
IH
2005
Springer
13 years 10 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
IH
2005
Springer
13 years 10 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...
SSWMC
2004
13 years 6 months ago
An informed synchronization scheme for audio data hiding
This paper deals with the problem of synchronization in the particular case of audio data hiding. In this kind of application the goal is to increase the information of an audio d...
Alejandro LoboGuerrero, Patrick Bas, Joel Lienard
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
13 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
13 years 2 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh