Sciweavers

211 search results - page 21 / 43
» Robustness and Security of Digital Watermarks
Sort
View
CSREASAM
2006
14 years 11 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
IH
2001
Springer
15 years 2 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
INFORMATICALT
2008
93views more  INFORMATICALT 2008»
14 years 10 months ago
Robust Watermarking based on Subsampling and Nonnegative Matrix Factorization
Abstract. This paper presents a novel robust digital image watermarking scheme using subsampling and nonnegative matrix factorization. Firstly, subsampling is used to construct a s...
Wei Lu, Hongtao Lu
ICASSP
2008
IEEE
15 years 4 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha
IWSOC
2003
IEEE
104views Hardware» more  IWSOC 2003»
15 years 3 months ago
IP Watermarking Techniques: Survey and Comparison
— Intellectual property (IP) block reuse is essential for facilitating the design process of System-on-a-Chip. Sharing IP blocks in such a competitive market poses significant h...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...