Elements of information theory
Elements of information theory
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Theory and Reliable Communication
Information Theory and Reliable Communication
Information Theory: Coding Theorems for Discrete Memoryless Systems
Information Theory: Coding Theorems for Discrete Memoryless Systems
Digital watermarking, fingerprinting and compression: an information-theoretic perspective
Digital watermarking, fingerprinting and compression: an information-theoretic perspective
Joint compression and digital watermarking: information-theoretic study and algorithms development
Joint compression and digital watermarking: information-theoretic study and algorithms development
Guessing subject to distortion
IEEE Transactions on Information Theory
On random coding error exponents of watermarking systems
IEEE Transactions on Information Theory
The Gaussian watermarking game
IEEE Transactions on Information Theory
On the error exponent and capacity games of private watermarking systems
IEEE Transactions on Information Theory
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
The parallel-Gaussian watermarking game
IEEE Transactions on Information Theory
On the capacity game of public watermarking systems
IEEE Transactions on Information Theory
On joint information embedding and lossy compression
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Capacity and Random-Coding Exponents for Channel Coding With Side Information
IEEE Transactions on Information Theory
Hi-index | 754.84 |
We establish random-coding lower bounds to the error exponent of discrete and Gaussian joint quantization and private watermarking systems. In the discrete system, both the covertext and the attack channel are memoryless and have finite alphabets. In the Gaussian system, the covertext is memoryless Gaussian and the attack channel has additive memoryless Gaussian noise. In both cases, our bounds on the error exponent are positive in the interior of the achievable quantization and watermarking rate region.