76 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This conclusion calls for a design framework for watermark detectors encompassing all the requirements on the detector. In order to build such framework, we model sensitivity analysis attacks as a general watermark estimation problem in which the adversary controls how informative the measurements will be about the watermark. We evaluate the fundamental performance limits for the attacker's watermark estimation problem. The inverse of the Fisher information matrix provides an algorithm-independent bound on the covariance matrix of the estimation error. A general strategy for the attacker is to select the distribution of auxiliary test signals that minimizes the trace of t...
In digital watermarking performance evaluation at least three major metrics: imperceptibility, robus...
In this paper, we consider the implementation of robust watermarking scheme for non i.i.d. Gaussian ...
Digital image watermarking techniques for copyright protection have become increasingly robust. The ...
76 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This conclusion calls for a de...
The problem of multiplicative watermark detection in digital images can be viewed as a binary decisi...
\u3cp\u3eIn some applications of electronic watermarks, the device that detects whether content cont...
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is ...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Digital watermarking is the practice of hiding a message in an image, audio, video or other digital ...
This paper presents an application of statis-tical machine learning to the field of water-marking. W...
Abstract — This paper develops a game-theoretic methodology to design and embed watermarks in signal...
A watermark is a perceptually unobtrusive signal embedded in an image, an audio or video clip, or an...
Abstract—The problem of optimum watermark embedding and detection was addressed in a recent paper by...
Generalized watermark attack based on watermark estimation and perceptual remodulation VOLOSHYNOVSKY...
We revisit the well-known watermarking detection problem, also known as one-bit watermarking, in the...
In digital watermarking performance evaluation at least three major metrics: imperceptibility, robus...
In this paper, we consider the implementation of robust watermarking scheme for non i.i.d. Gaussian ...
Digital image watermarking techniques for copyright protection have become increasingly robust. The ...
76 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This conclusion calls for a de...
The problem of multiplicative watermark detection in digital images can be viewed as a binary decisi...
\u3cp\u3eIn some applications of electronic watermarks, the device that detects whether content cont...
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is ...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Digital watermarking is the practice of hiding a message in an image, audio, video or other digital ...
This paper presents an application of statis-tical machine learning to the field of water-marking. W...
Abstract — This paper develops a game-theoretic methodology to design and embed watermarks in signal...
A watermark is a perceptually unobtrusive signal embedded in an image, an audio or video clip, or an...
Abstract—The problem of optimum watermark embedding and detection was addressed in a recent paper by...
Generalized watermark attack based on watermark estimation and perceptual remodulation VOLOSHYNOVSKY...
We revisit the well-known watermarking detection problem, also known as one-bit watermarking, in the...
In digital watermarking performance evaluation at least three major metrics: imperceptibility, robus...
In this paper, we consider the implementation of robust watermarking scheme for non i.i.d. Gaussian ...
Digital image watermarking techniques for copyright protection have become increasingly robust. The ...