Abstract. Copyright notification and enforcement, authentication, covert communication, and hybrid transmis-sion applications such as digital audio broadcasting are examples of emerging multimedia applications for digital watermarking and information embedding methods, methods for embedding one signal (e.g., the digital watermark) within another “host ” signal to form a third, “composite ” signal. The embedding is designed to achieve efficient trade-offs among the three conflicting goals of maximizing information-embedding rate, minimizing distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We present a class of embedding methods called quantization index modulation (QIM) that achieve pro...
[[abstract]]In public watermarking, watermark is extracted without reference to original media such ...
[[abstract]]The focus of the paper is to hide information in sinusoidal audio representations. Water...
Embedding capacity, distortion and resilience to attacks are three key indicators to the performance...
Copyright notification and enforcement, authentication, covert communication, and hybrid transmissio...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Abstract—To explore the principle and performances of Quantization Index Modulation (QIM) watermarki...
We propose a new watermarking method based on quantization index modulation. A concept of initial da...
A new technique utilizing Scalar Quantization is designed in this paper in order to be used for Digi...
We propose a robust digital watermarking algorithm for copyright protection. A stable feature is obt...
AbstractNowadays, the quantization index modulation (QIM) principle is popular in digital watermarki...
International audienceThis paper introduces the theoretical framework allowing for the binary quanti...
A novel quantization-based data-hiding method, called Rational Dither Modulation (RDM), is presented...
7 pagesInternational audienceWatermarking is a technique that consists in hiding/embedding binary in...
The increasing popularity of the internet means that digital multimedia are transmitted more rapidly...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
[[abstract]]In public watermarking, watermark is extracted without reference to original media such ...
[[abstract]]The focus of the paper is to hide information in sinusoidal audio representations. Water...
Embedding capacity, distortion and resilience to attacks are three key indicators to the performance...
Copyright notification and enforcement, authentication, covert communication, and hybrid transmissio...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Abstract—To explore the principle and performances of Quantization Index Modulation (QIM) watermarki...
We propose a new watermarking method based on quantization index modulation. A concept of initial da...
A new technique utilizing Scalar Quantization is designed in this paper in order to be used for Digi...
We propose a robust digital watermarking algorithm for copyright protection. A stable feature is obt...
AbstractNowadays, the quantization index modulation (QIM) principle is popular in digital watermarki...
International audienceThis paper introduces the theoretical framework allowing for the binary quanti...
A novel quantization-based data-hiding method, called Rational Dither Modulation (RDM), is presented...
7 pagesInternational audienceWatermarking is a technique that consists in hiding/embedding binary in...
The increasing popularity of the internet means that digital multimedia are transmitted more rapidly...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
[[abstract]]In public watermarking, watermark is extracted without reference to original media such ...
[[abstract]]The focus of the paper is to hide information in sinusoidal audio representations. Water...
Embedding capacity, distortion and resilience to attacks are three key indicators to the performance...