they call it steganography
models of watermarking
analysing erros
using perceptual models
robust watermarking
STEGANALYSIS
BACKGROUND CONCEPTS:
information theory
enttropy
mutua
mutual information
'communication rates
channel capacity
coding theory
covering Radius
Linear codes
Crytography:
smmetric Key cryprography
Assymetric key cryptography
ONe way Hash function
Cryptographic Signatures
models of watermarking
analysing erros
using perceptual models
robust watermarking
STEGANALYSIS
BACKGROUND CONCEPTS:
information theory
enttropy
mutua
mutual information
'communication rates
channel capacity
coding theory
covering Radius
Linear codes
Crytography:
smmetric Key cryprography
Assymetric key cryptography
ONe way Hash function
Cryptographic Signatures
APPENDIX B Selected Theoretical Results 511 B.1 Information-Theoretic Analysis of Secure Watermarking
(MoulinandO’Sullivan)......................... 511
B.1.1 B.1.2 B.1.3
WatermarkingasaGame............... General Capacity of Watermarking . . . . . . . . . Capacity with MSE Fidelity Constraint . . . . . . .
.... 511 .... 513 .... 514
B.2 Error Probabilities Using Normalized Correlation Detectors (MillerandBloom)............................ 517 B.3 Effect of Quantization Noise on Watermarks (Eggers and Girod) . 522
B.3.1 B.3.2 B.3.3 B.3.4 B.3.5
Background........................... 524 BasicApproach ........................ 524 Finding the Probability Density Function . . . . . . . . . . 524 Finding the Moment-Generating Function . . . . . . . . . 525 Determining the Expected Correlation for a Gaussian WatermarkandLaplacianContent. . . . . . . . . . . . . . 527
هیچ نظری موجود نیست:
ارسال یک نظر