Elements of information theory
Elements of information theory
IBM Systems Journal
Digital Coding of Waveforms: Principles and Applications to Speech and Video
Digital Coding of Waveforms: Principles and Applications to Speech and Video
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Modulation and Information Hiding in Images
Proceedings of the First International Workshop on Information Hiding
Design and analysis of digital watermarking, information embedding, and data hiding systems
Design and analysis of digital watermarking, information embedding, and data hiding systems
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Detecting electronic watermarks in digital video
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Journal on Selected Areas in Communications
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Digital image watermarking for joint ownership
Proceedings of the tenth ACM international conference on Multimedia
Jointly Verifying Ownership of an Image Using Digital Watermarking
Multimedia Tools and Applications
A new uncompressed-domain video watermarking approach robust to H.264/AVC compression
SPPRA'06 Proceedings of the 24th IASTED international conference on Signal processing, pattern recognition, and applications
A novel steganographic algorithm using animations as cover
Decision Support Systems
Embedding Renewable Cryptographic Keys into Continuous Noisy Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Watermarking robustness evaluation based on perceptual quality via genetic algorithms
IEEE Transactions on Information Forensics and Security
An improving watermarking algorithm based on quantization strategy
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Video watermarking by using geometric warping without visible artifacts
IH'06 Proceedings of the 8th international conference on Information hiding
IEEE Transactions on Information Forensics and Security
An adaptive robust watermarking algorithm for audio signals using SVD
Transactions on computational science X
Performance lower bounds for existing and new uncoded digital watermarking modulation techniques
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A method for deciding quantization steps in QIM watermarking schemes
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Improved quantization watermarking with an adaptive quantization step size and HVS
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
A novel multibit watermarking scheme combining spread spectrum and quantization
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Digital Image Authentication: A Review
International Journal of Digital Library Systems
Hi-index | 0.00 |
Copyright notification and enforcement, authentication, covert communication, and hybrid transmission applications such as digital audio broadcasting are examples of emerging multimedia applications for digital watermarking and information embedding methods, methods for embedding one signal (e.g., the digital watermark) within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient trade-offs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding.We present a class of embedding methods called quantization index modulation (QIM) that achieve provably good rate-distortion-robustness performance. These methods, and low-complexity realizations of them called dither modulation, are provably better than both previously proposed linear methods of spread spectrum and nonlinear methods of low-bit(s) modulation against square-error distortion-constrained intentional attacks. We also derive information-embedding capacities for the case of a colored Gaussian host signal and additive colored Gaussian noise attacks. These results imply an information embedding capacity of about 1/3 b/s of embedded digital rate for every Hertz of host signal bandwidth and every dB drop in received host signal quality.We show that QIM methods achieve performance within 1.6 dB of capacity, and we introduce a form of postprocessing we refer to as distortion compensation that, when combined with QIM, allows capacity to be achieved. In addition, we show that distortion-compensated QIM is an optimal embedding strategy against some important classes of intentional attacks as well. Finally, we report simulation results that demonstrate the performance of dither modulation realizations that can be implemented with only a few adders and scalar quantizers.