۱۳۸۹ تیر ۲۲, سه‌شنبه

related keywords

they call it steganography

models of watermarking

analysing erros
using perceptual models

robust watermarking

STEGANALYSIS

BACKGROUND CONCEPTS:
information theory

enttropy
mutua
mutual information
'communication rates
channel capacity
coding theory
covering Radius
Linear codes

Crytography:
smmetric Key cryprography
Assymetric key cryptography
ONe way Hash function
Cryptographic Signatures


APPENDIX B Selected Theoretical Results 511 B.1 Information-Theoretic Analysis of Secure Watermarking
(MoulinandO’Sullivan)......................... 511
B.1.1 B.1.2 B.1.3
WatermarkingasaGame............... General Capacity of Watermarking . . . . . . . . . Capacity with MSE Fidelity Constraint . . . . . . .
.... 511 .... 513 .... 514
B.2 Error Probabilities Using Normalized Correlation Detectors (MillerandBloom)............................ 517 B.3 Effect of Quantization Noise on Watermarks (Eggers and Girod) . 522
B.3.1 B.3.2 B.3.3 B.3.4 B.3.5
Background........................... 524 BasicApproach ........................ 524 Finding the Probability Density Function . . . . . . . . . . 524 Finding the Moment-Generating Function . . . . . . . . . 525 Determining the Expected Correlation for a Gaussian WatermarkandLaplacianContent. . . . . . . . . . . . . . 527

هیچ نظری موجود نیست:

ارسال یک نظر