The game of embedding and detecting spread spectrum watermarks under the estimation attack

被引:0
|
作者
Kirovski, D [1 ]
Malvar, H [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
D O I
10.1109/ISIT.2002.1023738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:466 / 466
页数:1
相关论文
共 50 条
  • [41] Spread spectrum data embedding in audio with UISA based cooperative detection
    Djaziri-Larbi, Sonia
    Turki-Haj Alouane, Monia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 32307 - 32331
  • [42] Spread spectrum data embedding in audio with UISA based cooperative detection
    Sonia Djaziri-Larbi
    Monia Turki-Haj Alouane
    Multimedia Tools and Applications, 2019, 78 : 32307 - 32331
  • [43] CORRELATION-AWARE DATA HIDING BASED ON SPREAD SPECTRUM EMBEDDING
    Valizadeh, Amir
    Wang, Z. Jane
    2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 205 - 208
  • [44] PN-sequence Masked Spread-Spectrum Data Embedding
    Li, Ming
    Liu, Qian
    Wang, Bo
    Guo, Yanqing
    Kong, Xiangwei
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [45] Optimal Spread Spectrum Watermark Embedding via a Multistep Feasibility Formulation
    Altun, H. Oklay
    Orsdemir, Adem
    Sharma, Gaurav
    Bocko, Mark F.
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2009, 18 (02) : 371 - 387
  • [46] MINIMUM MEAN SQUARE ERROR DETECTOR FOR MULTIMESSAGE SPREAD SPECTRUM EMBEDDING
    Valizadeh, Amir
    Wang, Z. Jane
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 121 - 124
  • [47] The zero-rate spread-spectrum watermarking game
    Moulin, P
    Ivanovic, A
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (04) : 1098 - 1117
  • [48] Rotation/scale insensitive spread spectrum image watermarking game
    Ossonce, M
    Le Guelvouit, G
    Delpha, C
    Duhamel, P
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [49] Gaussian Estimation under Attack Uncertainty
    Javidi, Tara
    Kaspi, Yonatan
    Tyagi, Himanshu
    2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [50] Secure distributed estimation under Byzantine attack and manipulation attack
    Wan, Fangyi
    Ma, Ting
    Hua, Yi
    Liao, Bin
    Qing, Xinlin
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 116