International audienceImperfectly synchronized watermark communication is almost the most hostile watermark channel. A desynchronization attack can yield a very high probability of bit error rate by simply moving the watermark from elements it has been embedded in, inhibiting hence its reliable retrieval from the original. In this paper, we adress attacks that can be modelled by an Additive White Gaussian Noise and Jitter (AWGN&J) channel in a game theory context. The AWGN&J channel was initially introduced to model local time fluctuations in the context of magnetic recording media. This channel is first briefly presented and characterized in terms of induced objective and perceptual distorsions. Also, performance loss of the one-bit waterm...
Digital watermarking is a technique that aims to embed a piece of information permanently into some ...
AbstractLarge scale of watermarking methods is available in the literature. These methods differ in ...
Abstract. We present a set of watermarking techniques for effective covert communication over an aud...
International audienceImperfectly synchronized watermark communication is almost the most hostile wa...
International audienceDigital watermarking is often modeled as the transmission of a message over a ...
International audienceDigital watermarking is often modelled as the transmission of a message over a...
In this paper, we consider the implementation of robust watermarking scheme for non i.i.d. Gaussian ...
Digital watermarking of multimedia (e.g., audio, images, video, etc.) can be viewed as a communicati...
Abstract. Watermarks are hidden, imperceptible, and robust marks augmented into a host signal such a...
International audienceJamming attacks have been shown to disrupt secret key generation (SKG) in syst...
Digital Watermarking is an ever increasing and important discipline, especially in the modern electr...
Large scale of watermarking methods is available in the literature. These methods differ in visibili...
In this paper we consider the problem of performance improvement of known-host-state (quantization-b...
Abstract — This paper develops a game-theoretic methodology to design and embed watermarks in signal...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Digital watermarking is a technique that aims to embed a piece of information permanently into some ...
AbstractLarge scale of watermarking methods is available in the literature. These methods differ in ...
Abstract. We present a set of watermarking techniques for effective covert communication over an aud...
International audienceImperfectly synchronized watermark communication is almost the most hostile wa...
International audienceDigital watermarking is often modeled as the transmission of a message over a ...
International audienceDigital watermarking is often modelled as the transmission of a message over a...
In this paper, we consider the implementation of robust watermarking scheme for non i.i.d. Gaussian ...
Digital watermarking of multimedia (e.g., audio, images, video, etc.) can be viewed as a communicati...
Abstract. Watermarks are hidden, imperceptible, and robust marks augmented into a host signal such a...
International audienceJamming attacks have been shown to disrupt secret key generation (SKG) in syst...
Digital Watermarking is an ever increasing and important discipline, especially in the modern electr...
Large scale of watermarking methods is available in the literature. These methods differ in visibili...
In this paper we consider the problem of performance improvement of known-host-state (quantization-b...
Abstract — This paper develops a game-theoretic methodology to design and embed watermarks in signal...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Digital watermarking is a technique that aims to embed a piece of information permanently into some ...
AbstractLarge scale of watermarking methods is available in the literature. These methods differ in ...
Abstract. We present a set of watermarking techniques for effective covert communication over an aud...