Sciweavers

CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 4 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux
CORR
2010
Springer
62views Education» more  CORR 2010»
13 years 4 months ago
Information embedding meets distributed control
We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recov...
Pulkit Grover, Aaron B. Wagner, Anant Sahai
ICMCS
1999
IEEE
127views Multimedia» more  ICMCS 1999»
13 years 8 months ago
Achievable Performance of Digital Watermarking Systems
A variety of digital watermarking applications have emerged recently that require the design of systems for embedding one signal (the "embedded signal" or "watermar...
Brian Chen, Gregory W. Wornell
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
13 years 10 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ICASSP
2008
IEEE
13 years 11 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha
ICIP
2002
IEEE
14 years 6 months ago
Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information
The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel, i.e. the host document. In light of this de...
Christine Guillemot, Gaëtan Le Guelvouit, St&...
ICIP
2007
IEEE
14 years 6 months ago
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia
In this paper, we analyze the effect of various collusion attacks on fingerprinting systems for compressed multimedia. We evaluate the effectiveness of the collusion attacks in te...
Avinash L. Varna, Shan He, Ashwin Swaminathan, Min...