Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.Includes bibliographical references (p. 185-193).This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Watermarking models a copyright protection mechanism where an original data sequence is modified before distribution to the public in order to embed some extra information. The embedding should be transparent (i.e., the modified data should be similar to the original data) and robust (i.e., the information should be recoverable even if the data is modified further). In this thesis, we describe the information-theoretic capacity of such ...
grantor: University of TorontoDigital watermarking technology is an approach for the prote...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
The ease with which digital data can be duplicated and distributed over the media and the Internetha...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Digital watermarking aims at embedding information in digital data. The watermark is usually require...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
A system which embeds watermarksin n-dimensional i.i.d. Gaussian images and distributesthem in compr...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking generative models consists of planting a statistical signal (watermark) in a model's ou...
This second part focuses on estimation of secret parameters of some practical watermarking technique...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
grantor: University of TorontoDigital watermarking technology is an approach for the prote...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
The ease with which digital data can be duplicated and distributed over the media and the Internetha...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Digital watermarking aims at embedding information in digital data. The watermark is usually require...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
A system which embeds watermarksin n-dimensional i.i.d. Gaussian images and distributesthem in compr...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking generative models consists of planting a statistical signal (watermark) in a model's ou...
This second part focuses on estimation of secret parameters of some practical watermarking technique...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
grantor: University of TorontoDigital watermarking technology is an approach for the prote...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...