• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 194,277
Next 10 →

Practical Data-Hiding: Additive Attacks Performance Analysis

by Vila Forcen, Jose Emilio, Et Al, J. E. Vila-forcén, S. Voloshynovskiy, O. Koval, T. Pun
"... The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for ∣M∣-ary quantization-based data-hiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the pract ..."
Abstract - Add to MetaCart
The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for ∣M∣-ary quantization-based data-hiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses

Practical Data-Hiding: Additive Attacks Performance Analysis

by J. E. Vila-Forcen, S. Voloshynovskiy, O. Koval, F. Perez-Gonzalez, T. Pun - In International Workshop on Digital Watermarking, volume LNCS 3710 of Lecture Notes in Computer Science , 2005
"... The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for |M|-ary quantizationbased data-hiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the pr ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for |M|-ary quantizationbased data-hiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses

Data-Hiding ∗ †

by Pedro Comesaña, Fernando Pérez-gonzález, Frans M. J. Willems
"... Structured codes are known to be necessary in practical implementations of capacity-approaching “dirty paper schemes”. In this paper we study the performance of a recently proposed dirty paper technique, by Erez and ten Brink which, to the authors ’ knowledge, is firstly applied to data-hiding, and ..."
Abstract - Add to MetaCart
Structured codes are known to be necessary in practical implementations of capacity-approaching “dirty paper schemes”. In this paper we study the performance of a recently proposed dirty paper technique, by Erez and ten Brink which, to the authors ’ knowledge, is firstly applied to data-hiding

Data-Hiding Codes

by Pierre Moulin, Ralf Koetter - Proc. IEEE , 2005
"... This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital m ..."
Abstract - Cited by 56 (4 self) - Add to MetaCart
focus is on the mathematical models, fundamental principles, and code design techniques that are applicable to data hiding. The approach draws from basic concepts in information theory, coding theory, game theory, and signal processing, and is illustrated with applications to the problem of hiding data

On Security Of Geometrically-Robust Data-Hiding

by Emre Topak , Sviatoslav Voloshynovskiy, Oleksiy Koval, José Emilio Vila Forcén, Thierry Pun , 2005
"... In this paper we analyze security of robust data-hiding in channels with geometrical transformations. We categorize possible decoding strategies for channels with geometrical transformations within the information-theoretic framework for geometrically-robust datahiding. Furthermore, considering temp ..."
Abstract - Add to MetaCart
In this paper we analyze security of robust data-hiding in channels with geometrical transformations. We categorize possible decoding strategies for channels with geometrical transformations within the information-theoretic framework for geometrically-robust datahiding. Furthermore, considering

Asymmetrically Informed Data-Hiding Optimization of

by Achievable Rate For, J. E. Vila-forcén, S. Voloshynovskiy, O. Koval, E. Topak, T. Pun , 2005
"... In data-hiding the issue of the achievable rate maximization is closely related to the problem of host interference cancellation. The optimal host interference cancellation relies on the knowledge of the host realization and the channel statistics (the additive white Gaussian noise (AWGN) variance) ..."
Abstract - Add to MetaCart
In data-hiding the issue of the achievable rate maximization is closely related to the problem of host interference cancellation. The optimal host interference cancellation relies on the knowledge of the host realization and the channel statistics (the additive white Gaussian noise (AWGN) variance

The Data-Hiding Capacity of Image Sources

by Pierre Moulin, M. Kıvanc Mıhcak - IEEE TRANS. IMAGE PROC. SUBMITTED , 2000
"... An information-theoretic model for image watermarking and data hiding is proposed in this paper. Recent theoretical results are used to characterize the fundamental capacity limits of image watermarking and data-hiding systems. Capacity is determined by the statistical model used for the host ima ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
An information-theoretic model for image watermarking and data hiding is proposed in this paper. Recent theoretical results are used to characterize the fundamental capacity limits of image watermarking and data-hiding systems. Capacity is determined by the statistical model used for the host

Optimal Data-Hiding Strategies for Games with

by Ber Payoffs, Pedro Comesaña, O Pérez-gonzález, Félix Balado
"... Abstract. We analyze three different data hiding methods from a gametheoretic point of view, using the probability of bit error as the payoff. Those data hiding schemes can be regarded to as representatives of three families of methods: spread-spectrum, informed-embedding and hybrid. In all cases, w ..."
Abstract - Add to MetaCart
Abstract. We analyze three different data hiding methods from a gametheoretic point of view, using the probability of bit error as the payoff. Those data hiding schemes can be regarded to as representatives of three families of methods: spread-spectrum, informed-embedding and hybrid. In all cases

Practical network support for IP traceback

by Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson , 2000
"... This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source ad ..."
Abstract - Cited by 666 (14 self) - Add to MetaCart
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source addresses. In this paper we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed “post-mortem ” – after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backwards compatible and can be efficiently implemented using conventional technology. 1.

Distributed Computing in Practice: The Condor Experience

by Douglas Thain, Todd Tannenbaum, Miron Livny - Concurrency and Computation: Practice and Experience , 2005
"... Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the world-wide computational grid. In this chapter, we provide the history ..."
Abstract - Cited by 542 (7 self) - Add to MetaCart
Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the world-wide computational grid. In this chapter, we provide the history and philosophy of the Condor project and describe how it has interacted with other projects and evolved along with the field of distributed computing. We outline the core components of the Condor system and describe how the technology of computing must correspond to social structures. Throughout, we reflect on the lessons of experience and chart the course traveled by research ideas as they grow into production systems.
Next 10 →
Results 1 - 10 of 194,277
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University