Elements of information theory
Elements of information theory
The zero-rate spread-spectrum watermarking game
IEEE Transactions on Signal Processing
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
Reliable communication under channel uncertainty
IEEE Transactions on Information Theory
On random coding error exponents of watermarking systems
IEEE Transactions on Information Theory
Identification in the presence of side information with application to watermarking
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Nested linear/lattice codes for structured multiterminal binning
IEEE Transactions on Information Theory
The Gaussian watermarking game
IEEE Transactions on Information Theory
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A framework for evaluating the data-hiding capacity of image sources
IEEE Transactions on Image Processing
Using informed coding and informed embedding to design robust fingerprinting embedding systems
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Hi-index | 0.00 |
This paper reviews recent research on information-theoretic aspects of information hiding. Emphasis is placed on applications requiring high payload (e.g., covert communications). Information hiding may be viewed as a game between two teams (embedder/decoder vs. attacker), and optimal information-embedding and attack strategies may be developed in this context. This paper focuses on several such strategies, including a framework for developing near-optimal codes and universal decoders. The suboptimality of spread-spectrum strategies follows from the analysis. The theory is applied to image watermarking examples.