ICA for watermarking digital images
The Journal of Machine Learning Research
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Hidden Markov models and steganalysis
Proceedings of the 2004 workshop on Multimedia and security
Proceedings of the 2004 workshop on Multimedia and security
ICA for watermarking digital images
The Journal of Machine Learning Research
Capacity of steganographic channels
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
An overview of scalar quantization based data hiding methods
Signal Processing
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Analysis of blind data hiding using discrete cosine transform phase modulation
Image Communication
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Circularly orthogonal moments for geometrically robust image watermarking
Pattern Recognition
Group-oriented fingerprinting for multimedia forensics
EURASIP Journal on Applied Signal Processing
Unicode Steganographic Exploits: Maintaining Enterprise Border Security
IEEE Security and Privacy
A coding problem in steganography
Designs, Codes and Cryptography
Reliability criteria in information theory and in statistical hypothesis testing
Foundations and Trends in Communications and Information Theory
WMicaD: a new digital watermarking technique using independent component analysis
EURASIP Journal on Advances in Signal Processing
A novel steganographic algorithm using animations as cover
Decision Support Systems
Channel Coding in the Presence of Side Information
Foundations and Trends in Communications and Information Theory
Multiaccess channels with state known to some encoders and independent messages
EURASIP Journal on Wireless Communications and Networking - Theory and Applications in Multiuser/Multiterminal Communications
Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
Information Sciences: an International Journal
Towards an Information Theoretic Analysis of Searchable Encryption
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
On the Complexity of Obtaining Optimal Watermarking Schemes
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Coding schemes for relay-assisted information embedding
IEEE Transactions on Information Forensics and Security
On estimation accuracy of desynchronization attack channel parameters
IEEE Transactions on Information Forensics and Security
Performance of orthogonal fingerprinting codes under worst-case noise
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Multimedia
Robust audio data hiding using correlated quantization with histogram-based detector
IEEE Transactions on Multimedia
Optimal spread spectrum watermark embedding via a multistep feasibility formulation
IEEE Transactions on Image Processing
Capacity of steganographic channels
IEEE Transactions on Information Theory
Random-coding lower bounds for the error exponent of joint quantization and watermarking systems
IEEE Transactions on Information Theory
Precoding for the AWGN channel with discrete interference
IEEE Transactions on Information Theory
On the designs and challenges of practical binary dirty paper coding
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Optical steganography for data hiding in optical networks
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Saddle-point solution of the fingerprinting capacity game under the marking assumption
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Information embedding with reversible stegotext
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Coding and common reconstruction
IEEE Transactions on Information Theory
Informed recognition in software watermarking
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Informed embedding for multi-bit watermarks
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
High capacity watermarking in nonedge texture under statistical distortion constraint
ACCV'07 Proceedings of the 8th Asian conference on Computer vision - Volume Part I
An information-hiding model for secure communication
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Approach to hide secret speech information in G.721 scheme
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
An improved digital watermarking algorithm dedicated to electronic seal
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Transactions on data hiding and multimedia security III
Quantization-based methods: additive attacks performance analysis
Transactions on data hiding and multimedia security III
Lower bounds on the capacity of the relay channel with states at the source
EURASIP Journal on Wireless Communications and Networking
Robust image data hiding using geometric mean quantization
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Contourlet-based image watermarking using optimum detector in a noisy environment
IEEE Transactions on Image Processing
Variations on information embedding in multiple access and broadcast channels
IEEE Transactions on Information Theory
Cooperative relaying with state available noncausally at the relay
IEEE Transactions on Information Theory
Quantized based image watermarking in an independent domain
Image Communication
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes
Proceedings of the 11th annual ACM workshop on Digital rights management
On reversibility of random binning techniques: multimedia perspectives
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Oracle attacks and covert channels
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Practical data-hiding: additive attacks performance analysis
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Improved QIM strategies for gaussian watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
On achievable regions of public multiple-access gaussian watermarking systems
IH'04 Proceedings of the 6th international conference on Information Hiding
G.711-Based adaptive speech information hiding approach
ICIC'06 Proceedings of the 2006 international conference on Intelligent Computing - Volume Part I
Efficient algorithms in determining JPEG-Effective watermark coefficients
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
NFD technique for efficient and secured information hiding in low resolution images
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Watermarking identification codes with related topics on common randomness
General Theory of Information Transfer and Combinatorics
Dirty-Paper trellis-code watermarking with orthogonal arcs
PSIVT'06 Proceedings of the First Pacific Rim conference on Advances in Image and Video Technology
An Authentication Technique for Image/Legal Document (ATILD)
Journal of Signal Processing Systems
Performance and code length optimization of joint decoding tardos fingerprinting
Proceedings of the on Multimedia and security
A framework for transformation from conceptual to logical workflow models
Decision Support Systems
Webpage information hiding algorithm based on integration of tags and data
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Leakage detection and tracing for databases
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 755.20 |
An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding. In these applications, information is hidden within a host data set and is to be reliably communicated to a receiver. The host data set is intentionally corrupted, but in a covert way, designed to be imperceptible to a casual analysis. Next, an attacker may seek to destroy this hidden information, and for this purpose, introduce additional distortion to the data set. Side information (in the form of cryptographic keys and/or information about the host signal) may be available to the information hider and to the decoder. We formalize these notions and evaluate the hiding capacity, which upper-bounds the rates of reliable transmission and quantifies the fundamental tradeoff between three quantities: the achievable information-hiding rates and the allowed distortion levels for the information hider and the attacker. The hiding capacity is the value of a game between the information hider and the attacker. The optimal attack strategy is the solution of a particular rate-distortion problem, and the optimal hiding strategy is the solution to a channel-coding problem. The hiding capacity is derived by extending the Gel'fand-Pinsker (1980) theory of communication with side information at the encoder. The extensions include the presence of distortion constraints, side information at the decoder, and unknown communication channel. Explicit formulas for capacity are given in several cases, including Bernoulli and Gaussian problems, as well as the important special case of small distortions. In some cases, including the last two above, the hiding capacity is the same whether or not the decoder knows the host data set. It is shown that many existing information-hiding systems in the literature operate far below capacity.