Scalar scheme for multiple user information embedding

被引:0
|
作者
Zaidi, A [1 ]
Piantanida, P [1 ]
Duhamel, P [1 ]
机构
[1] CNRS, LSS, Signaux & Syst Lab, F-91190 Gif Sur Yvette, France
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multiple watermarking is concerned with embedding several messages into the same host signal, with different robustness and transparency requirements. This paper proposes two implementable scalar schemes for multiple user "Dirty Paper Coding". The first -straightforward- approach consists in an independent superposition of two scalar Dirty Paper Coding schemes. The second consists in a joint design of a scalar Dirty Paper Coding. This joint approach is based on the ideal DPC scheme for Broadcast Channels with noncausal side information known to the transmitter. For this purpose, the "Scalar Costa Scheme" that has been originally conceived for one user is extended to two users. Performance evaluations, including Bit Error Rates and Capacity region curves are provided for both methods, illustrating the improvements brought by a joint design.
引用
收藏
页码:5 / 8
页数:4
相关论文
共 50 条
  • [1] Scalar costa scheme for information embedding
    Eggers, JJ
    Bäuml, R
    Tzschoppe, R
    Girod, B
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (04) : 1003 - 1019
  • [2] MAC aware coding strategy for multiple user information-embedding
    Zaidi, Abdellatif
    Piantanida, Pablo
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-13, 2006, : 5251 - 5254
  • [3] On the efficiency of embedding information within scalar quantizers
    Davies, Mike
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 853 - 859
  • [4] Broadcast- and MAC-aware coding strategies for multiple user information embedding
    Zaidi, Abdellatif
    Piantanida, Pablo
    Duhamel, Pierre
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (06) : 2974 - 2992
  • [5] The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions
    Lin, Sian-Jheng
    Chung, Wei-Ho
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1155 - 1167
  • [6] Complete Double Layered Embedding Scheme for Information Hiding
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chao, Hung-Lin
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 525 - +
  • [7] A multiple user opportunistic scheme: The Grassmannian approach
    Zorba, Nizar
    Perez-Neira, Ana I.
    [J]. 2006 INTERNATIONAL ZURICH SEMINAR ON COMMUNICATIONS: ACCESS - TRANSMISSION - NETWORKING, PROCEEDINGS, 2006, : 134 - +
  • [8] MULTIPLE USER INFORMATION-THEORY
    ELGAMAL, A
    COVER, TM
    [J]. PROCEEDINGS OF THE IEEE, 1980, 68 (12) : 1466 - 1483
  • [9] Heterogeneous information network embedding for user behavior analysis on social media
    Xiaofang Zhao
    Zhigang Jin
    Yuhong Liu
    Yi Hu
    [J]. Neural Computing and Applications, 2022, 34 : 5683 - 5699
  • [10] Information embedding based on user's relevance feedback for image retrieval
    Lee, CS
    Ma, WY
    Zhang, HJ
    [J]. MULTIMEDIA STORAGE AND ARCHIVING SYSTEMS IV, 1999, 3846 : 294 - 304