Results 1  10
of
1,489
Practical DataHiding: Additive Attacks Performance Analysis
 In International Workshop on Digital Watermarking, volume LNCS 3710 of Lecture Notes in Computer Science
, 2005
"... The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for Mary quantizationbased datahiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the pr ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for Mary quantizationbased datahiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses
DitherModulation Data Hiding with DistortionCompensation: Exact Performance Analysis and an Improved Detector for JPEG Attacks
 in Proc. of the IEEE International Conference on Image Processing (ICIP
, 2003
"... The binary Distortion Compensated DitherModulation (DCDM) , which can be regarded to as a baseline for quantizationbased datahiding methods, is rigorously analyzed. A novel and accurate procedure for computing the exact probability of bit error is given, as well as an approximation amenable to d ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
The binary Distortion Compensated DitherModulation (DCDM) , which can be regarded to as a baseline for quantizationbased datahiding methods, is rigorously analyzed. A novel and accurate procedure for computing the exact probability of bit error is given, as well as an approximation amenable
Worst Case Additive Attack against QuantizationBased DataHiding Methods
, 2005
"... The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantizationbased methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known as ..."
Abstract

Cited by 13 (4 self)
 Add to MetaCart
The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantizationbased methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known
QuantizationBased DataHiding Robust to Linear TimeInvariant Filtering 1
, 2007
"... Quantizationbased methods, such as Dither Modulation (DM), have gained wide acceptance due to their host rejection capabilities which afford significant performance gains over spreadspectrumbased methods in additive white Gaussian channels. Unfortunately, existing quantizationbased schemes are n ..."
Abstract
 Add to MetaCart
Quantizationbased methods, such as Dither Modulation (DM), have gained wide acceptance due to their host rejection capabilities which afford significant performance gains over spreadspectrumbased methods in additive white Gaussian channels. Unfortunately, existing quantizationbased schemes
QuantizationBased Data Hiding
, 2005
"... This paper comes to fill a gap in watermarking theory, analyzing the exact performance of the scalar Costa scheme (SCS) facing additive Gaussian attacks when the usual approximation of highresolution quantization is not valid, thus taking into account the host statistics. The analysis is focused on ..."
Abstract
 Add to MetaCart
of SCS is never worse than that of classical spreadspectrumbased methods, as it was thought so far, and allows to establish interesting links with spread spectrum and the Improved Spread Spectrum method.
IMPROVED BINARY DITHERMODULATION WITH PERCEPTUAL CONSTRAINTS
"... The binary Distortion Compensated DitherModulation (DCDM), which can be regarded to as a baseline for quantizationbased datahiding methods, is rigorously analyzed. An accurate procedure for computing the exact probability of bit error is given, as well as the optimal weights in a newly proposed d ..."
Abstract
 Add to MetaCart
The binary Distortion Compensated DitherModulation (DCDM), which can be regarded to as a baseline for quantizationbased datahiding methods, is rigorously analyzed. An accurate procedure for computing the exact probability of bit error is given, as well as the optimal weights in a newly proposed
Practical DataHiding: Additive Attacks Performance Analysis
"... The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for ∣M∣ary quantizationbased datahiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the pract ..."
Abstract
 Add to MetaCart
The main goal of this tutorial is to review the theory and design the worst case additive attack (WCAA) for ∣M∣ary quantizationbased datahiding methods using as performance criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses
Spreadspectrum vs. quantizationbased data hiding: Misconceptions and implications
 in Proceedings of IS&T/SPIE 17th Annual Symposium: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, 2005
"... The performance of quantizationbased data hiding methods is commonly analyzed by assuming a flat probability density function for the host signal, i.e. uniform inside each quantization cell and with its variance large enough to assuming that all the centroids occur with equal probability. This pape ..."
Abstract

Cited by 6 (3 self)
 Add to MetaCart
The performance of quantizationbased data hiding methods is commonly analyzed by assuming a flat probability density function for the host signal, i.e. uniform inside each quantization cell and with its variance large enough to assuming that all the centroids occur with equal probability
QuantizationBased Methods: Additive Attacks Performance Analysis
, 2008
"... The main goal of this study consists in the development of the worst case additive attack (WCAA) for Mary quantizationbased datahiding methods using as design criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the practical scheme ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
The main goal of this study consists in the development of the worst case additive attack (WCAA) for Mary quantizationbased datahiding methods using as design criteria the error probability and the maximum achievable rate of reliable communications. Our analysis focuses on the practical
Rational dither modulation: a novel datahiding method robust to valuemetric attacks
 In In IEEE International Workshop on Multimedia Signal Processing
, 2004
"... Abstract — A novel quantizationbased datahiding method, named Rational Dither Modulation (RDM), is presented. This method amounts to simple modifications of the wellknown Dither Modulation (DM) scheme, which is largely vulnerable to scaling attacks. With such modifications, RDM becomes invariant ..."
Abstract

Cited by 7 (0 self)
 Add to MetaCart
Abstract — A novel quantizationbased datahiding method, named Rational Dither Modulation (RDM), is presented. This method amounts to simple modifications of the wellknown Dither Modulation (DM) scheme, which is largely vulnerable to scaling attacks. With such modifications, RDM becomes invariant
Results 1  10
of
1,489