Sciweavers

IWDW
2005
Springer
13 years 9 months ago
Practical Data-Hiding: Additive Attacks Performance Analysis
José-Emilio Vila-Forcén, Sviatoslav ...
IWDW
2005
Springer
13 years 9 months ago
Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Un
Calculation of watermarking capacities of private Laplacian watermarking systems with the magnitude-error distortion measure under fixed attacks is addressed. First, in the case o...
Wei Sun, En-Hui Yang
IWDW
2005
Springer
13 years 9 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
IWDW
2005
Springer
13 years 9 months ago
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect
Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improv...
Amir Houman Sadr, Shahrokh Ghaemmaghami
IWDW
2005
Springer
13 years 9 months ago
Towards Multi-class Blind Steganalyzer for JPEG Images
In this paper, we use the previously proposed calibrated DCT features [9] to construct a Support Vector Machine classifier for JPEG images capable of recognizing which steganograp...
Tomás Pevný, Jessica J. Fridrich
IWDW
2005
Springer
13 years 9 months ago
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
Mark T. Hogan, Félix Balado, Neil J. Hurley...
IWDW
2005
Springer
13 years 9 months ago
Performance Study on Multimedia Fingerprinting Employing Traceability Codes
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is ...
Shan He, Min Wu
IWDW
2005
Springer
13 years 9 months ago
Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques
Abstract. Many coded digital watermarking systems development requires first the selection of a (uncoded) modulation technique to be part of a coded architecture. Therefore, perfo...
Marcos de Castro Pacitti, Weiler Alves Finamore
IWDW
2005
Springer
13 years 9 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon