1 Research on information embedding and particularly information hiding techniques has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental at-tacks, might offer new possibilities to enforce the copyrights of multimedia data. In this article, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, Costa pro-posed already in 1983 a scheme that theoretically achieves the capacity...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
International audienceA generalization of the problem of dirty paper coding is considered in which (...
The performance of quantization-based data hiding methods is commonly analyzed by assuming a flat pr...
This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS)...
International audienceIn this paper, we propose an audio watermarking scheme based on the scalar Cos...
International audienceNowadays, multimedia data protection widely uses data hiding technology like D...
Digital watermarking aims at embedding information in digital data. The watermark is usually require...
Scalar Costa Scheme (SCS) watermarking is a practical version of Costa’s capacity achieving blind wa...
Scalar Costa Scheme (SCS) watermarking is a practical version of Costa’s capacity achieving blind wa...
International audienceThe steganographic security in the Cachin's work is defined as the statistical...
Abstract — Digital watermarking is a technology which potentially can be used to enforce the copyrig...
International audienceThis paper presents a performance study for two well known quantized based wat...
In this paper, we analyze oblivious (blind) information hiding methods from a new perspective. In [...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
International audienceA generalization of the problem of dirty paper coding is considered in which (...
The performance of quantization-based data hiding methods is commonly analyzed by assuming a flat pr...
This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS)...
International audienceIn this paper, we propose an audio watermarking scheme based on the scalar Cos...
International audienceNowadays, multimedia data protection widely uses data hiding technology like D...
Digital watermarking aims at embedding information in digital data. The watermark is usually require...
Scalar Costa Scheme (SCS) watermarking is a practical version of Costa’s capacity achieving blind wa...
Scalar Costa Scheme (SCS) watermarking is a practical version of Costa’s capacity achieving blind wa...
International audienceThe steganographic security in the Cachin's work is defined as the statistical...
Abstract — Digital watermarking is a technology which potentially can be used to enforce the copyrig...
International audienceThis paper presents a performance study for two well known quantized based wat...
In this paper, we analyze oblivious (blind) information hiding methods from a new perspective. In [...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
International audienceA generalization of the problem of dirty paper coding is considered in which (...