An overview of scalar quantization based data hiding methods
Signal Processing
On achievable security levels for lattice data hiding in the known message attack scenario
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Transparency and complexity benchmarking of audio watermarking algorithms issues
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Bandwidth extension of telephone speech aided by data embedding
EURASIP Journal on Applied Signal Processing
An interpolation-based watermarking scheme
Signal Processing
Audio watermarking through deterministic plus stochastic signal decomposition
EURASIP Journal on Information Security
Self-synchronizing robust texel watermarking in gaussian scale-space
Proceedings of the 10th ACM workshop on Multimedia and security
Channel Coding in the Presence of Side Information
Foundations and Trends in Communications and Information Theory
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Fundamenta Informaticae
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Generalized embedding of multiplicative watermarks
IEEE Transactions on Circuits and Systems for Video Technology
A novel audio digital watermarking algorithm based on U systems
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Hyperbolic RDM for nonlinear valumetric distortions
IEEE Transactions on Information Forensics and Security
Coding schemes for relay-assisted information embedding
IEEE Transactions on Information Forensics and Security
On estimation accuracy of desynchronization attack channel parameters
IEEE Transactions on Information Forensics and Security
Robust audio data hiding using correlated quantization with histogram-based detector
IEEE Transactions on Multimedia
Near-capacity dirty-paper code design: a source-channel coding approach
IEEE Transactions on Information Theory
Multi-watermarking Scheme for Copyright Protection and Content Authentication of Digital Audio
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Speech watermarking for analog flat-fading bandpass channels
IEEE Transactions on Audio, Speech, and Language Processing
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
Secure client-side ST-DM watermark embedding
IEEE Transactions on Information Forensics and Security
Design and implementation of steganographic speech telephone
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Quantization-based methods: additive attacks performance analysis
Transactions on data hiding and multimedia security III
Robust image data hiding using geometric mean quantization
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security evaluation of informed watermarking schemes
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Minimum mean square error detector for multimessage spread spectrum embedding
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Blind and robust mesh watermarking using manifold harmonics
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
On the robustness of dirty paper coding
IEEE Transactions on Communications
IEEE Transactions on Communications
Technical Section: Robust and blind mesh watermarking based on volume moments
Computers and Graphics
Quantized based image watermarking in an independent domain
Image Communication
How quantization based schemes can be used in image steganographic context
Image Communication
A high throughput system for intelligent watermarking of bi-tonal images
Applied Soft Computing
IH'11 Proceedings of the 13th international conference on Information hiding
Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation
Digital Signal Processing
Analyzing the performance of dither modulation in presence of composite attacks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Practical data-hiding: additive attacks performance analysis
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Trellis-coded rational dither modulation for digital watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Improved QIM strategies for gaussian watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fixed-Distortion orthogonal dirty paper coding for perceptual still image watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Watermarking attack: security of WSS techniques
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Optimal embedding for watermarking in discrete data spaces
IH'05 Proceedings of the 7th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Information-theoretic analysis of security in side-informed data hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Dirty-paper writing based on LDPC codes for data hiding
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
A novel multibit watermarking scheme combining spread spectrum and quantization
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Fundamenta Informaticae
Witsenhausen's counterexample and its links with multimedia security problems
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A new measure of watermarking security applied on QIM
IH'12 Proceedings of the 14th international conference on Information Hiding
A new approach to high-capacity annotation watermarking based on digital fountain codes
Multimedia Tools and Applications
An improved sample projection approach for image watermarking
Digital Signal Processing
Multi-symbol QIM video watermarking
Image Communication
Hi-index | 35.74 |
Research on information embedding, particularly information hiding techniques, has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this paper, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, in 1983, Costa proposed a scheme that theoretically achieves the capacity of this communication scenario. However, Costa's scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa's idea. The goal of this paper is to give a complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and the invertibility of SCS embedding are investigated.