[图书][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

The role of information theory in watermarking and its application to image watermarking

P Moulin - Signal Processing, 2001 - Elsevier
This paper reviews the role of information theory in characterizing the fundamental limits of
watermarking systems and in guiding the development of optimal watermark embedding …

Secure space-time communication

AO Hero - IEEE Transactions on Information Theory, 2003 - ieeexplore.ieee.org
Network security is important for information protection in open, secure, or covert
communications. One such requirement is to achieve high-rate communications between …

A framework for evaluating the data-hiding capacity of image sources

P Moulin, MK Mihcak - IEEE Transactions on Image Processing, 2002 - ieeexplore.ieee.org
An information-theoretic model for image watermarking and data hiding is presented in this
paper. Previous theoretical results are used to characterize the fundamental capacity limits …

A novel SVD-and VQ-based image hiding scheme

KL Chung, CH Shen, LC Chang - Pattern Recognition Letters, 2001 - Elsevier
This paper presents a novel singular value decomposition (SVD)-and vector quantization
(VQ)-based image hiding scheme to hide image data. Plugging the VQ technique into the …

[图书][B] Multimedia data hiding

M Wu, B Liu - 2003 - books.google.com
With the advances of the digital information revolution and the societal changes they have
prompted, it has become critical to facilitate secure management of content usage and …

Is image steganography natural?

A Martin, G Sapiro, G Seroussi - IEEE Transactions on Image …, 2005 - ieeexplore.ieee.org
Steganography is the art of secret communication. Its purpose is to hide the presence of
information, using, for example, images as covers. We experimentally investigate if stego …

Digital image watermarking: its formal model, fundamental properties and possible attacks

H Nyeem, W Boles, C Boyd - EURASIP Journal on Advances in Signal …, 2014 - Springer
While formal definitions and security proofs are well established in some fields like
cryptography and steganography, they are not as evident in digital watermarking research. A …

Benchmarking for steganography

T Pevný, J Fridrich - international workshop on information hiding, 2008 - Springer
With the increasing number of new steganographic algorithms as well as methods for
detecting them, the issue of comparing security of steganographic schemes in a fair manner …

The parallel-Gaussian watermarking game

P Moulin, MK Mihcak - IEEE Transactions on Information …, 2004 - ieeexplore.ieee.org
Rates of reliable transmission of hidden information are derived for watermarking problems
involving parallel Gaussian sources, which are often used to model host images and audio …