Sciweavers

79
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 11 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux
84
Voted
CORR
2010
Springer
62views Education» more  CORR 2010»
14 years 11 months ago
Information embedding meets distributed control
We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recov...
Pulkit Grover, Aaron B. Wagner, Anant Sahai
88
Voted
ICMCS
1999
IEEE
127views Multimedia» more  ICMCS 1999»
15 years 3 months ago
Achievable Performance of Digital Watermarking Systems
A variety of digital watermarking applications have emerged recently that require the design of systems for embedding one signal (the "embedded signal" or "watermar...
Brian Chen, Gregory W. Wornell
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
74
Voted
ICASSP
2008
IEEE
15 years 5 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha
ICIP
2002
IEEE
16 years 13 days ago
Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information
The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel, i.e. the host document. In light of this de...
Christine Guillemot, Gaëtan Le Guelvouit, St&...
66
Voted
ICIP
2007
IEEE
16 years 16 days ago
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia
In this paper, we analyze the effect of various collusion attacks on fingerprinting systems for compressed multimedia. We evaluate the effectiveness of the collusion attacks in te...
Avinash L. Varna, Shan He, Ashwin Swaminathan, Min...