Sciweavers

11 search results - page 1 / 3
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ICASSP
2008
IEEE
15 years 7 months ago
A new implementation of trellis coded quantization based data hiding
This paper discusses the construction and implementation problem of trellis coded quantization (TCQ) based data hiding. We explore the robustness and distortion of data hiding by ...
Xiaofeng Wang, Xiao-Ping Zhang
ICASSP
2011
IEEE
14 years 5 months ago
A robust quantization method using a robust Chinese remainder theorem for secret key generation
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authoriz...
Wenjie Wang, Chen Wang, Xiang-Gen Xia
ICASSP
2009
IEEE
15 years 8 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICASSP
2011
IEEE
14 years 5 months ago
Steady-state analysis of the NLMS algorithm with reusing coefficient vector and a method for improving its performance
The reuse of past coefficient vectors of the NLMS for reducing the steady-state MSD in a low signal-to-noise ratio (SNR) was proposed recently. Its convergence analysis has not b...
Seong-Eun Kim, Jae-Woo Lee, Woo-Jin Song
ICASSP
2011
IEEE
14 years 5 months ago
Analysis of human footsteps utilizing multi-axial seismic fusion
This paper introduces a method of enhancing an unattended ground sensor (UGS) system’s classification capability of humans via seismic signatures while subsequently discriminati...
Sean Schumer