Sphere-packings, lattices, and groups
Sphere-packings, lattices, and groups
Elements of information theory
Elements of information theory
Information Theory and Reliable Communication
Information Theory and Reliable Communication
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Variations on information embedding in multiple access and broadcast channels
IEEE Transactions on Information Theory
Enhanced security architecture for music distribution on mobile
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks
IEEE Transactions on Signal Processing - Part II
Broadcast- and MAC-Aware Coding Strategies for Multiple User Information Embedding
IEEE Transactions on Signal Processing
Sphere-bound-achieving coset codes and multilevel coset codes
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Nested linear/lattice codes for structured multiterminal binning
IEEE Transactions on Information Theory
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
Capacity and lattice strategies for canceling known interference
IEEE Transactions on Information Theory
Carbon Copying Onto Dirty Paper
IEEE Transactions on Information Theory
Cooperative Multiple-Access Encoding With States Available at One Transmitter
IEEE Transactions on Information Theory
Lower bounds on the capacity of the relay channel with states at the source
EURASIP Journal on Wireless Communications and Networking
Cooperative relaying with state available noncausally at the relay
IEEE Transactions on Information Theory
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Hi-index | 0.06 |
Cooperative information embedding deals with the problem of embedding unperceived information into some cover signal by different users or partners, cooperatively. It models applications in which embedded signals, or watermarks, transmitted over wireless networks need to be reinforced in order to withstand channel impairments. In cooperative information embedding, each embedder that can reinforce the embedded signal may or may not know the original cover signal. In this paper, we concentrate on the two user cases: 1) an initial embedder and 2) an assisting embedder or helper collaborate to embed some watermark into given digital media content which is transmitted over a wireless network. One important application is that of infrastructure-aided information embedding, a case in which the network provider plays the role of a helper and contributes to securing the distribution of the media, not only by blocking unauthorized signals but also by reinforcing the watermarks in legitimate signals. We investigate the two scenarios in which the helper does or does not know the cover signal. For each scenario, we derive lower and upper bounds on channel capacity. Furthermore, we also design implementable coding schemes and derive the embedding rates practically allowed by these schemes, for both scenarios. Among others, the performance characterization shows that for cooperative information embedding to be effective, careful code design is required at the initial embedder and the helper. The careful design concerns the joint conception of the embedded codes and the exploitation of the knowledge of the cover signal, if any.