2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)
DOI: 10.1109/isit.2000.866309
|View full text |Cite
|
Sign up to set email alerts
|

Information-theoretic analysis of information hiding

Abstract: Abstract-An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding. In these applications, information is hidden within a host data set and is to be reliably communicated to a receiver. The host data set is intentionally corru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

2
264
0
3

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 164 publications
(273 citation statements)
references
References 5 publications
2
264
0
3
Order By: Relevance
“…O'Sullivan, Moulin and Ettinger were among the first who recognized this game [1]. In the extended version of the previous paper [2], Moulin and O'Sullivan have considered two possible set-ups. In the first set-up they assumed the availability of host at both encoder and decoder, i.e., the so-called private game and in the second one they considered a case, where the host is available only at the encoder, i.e., public game.…”
Section: Introductionmentioning
confidence: 99%
“…O'Sullivan, Moulin and Ettinger were among the first who recognized this game [1]. In the extended version of the previous paper [2], Moulin and O'Sullivan have considered two possible set-ups. In the first set-up they assumed the availability of host at both encoder and decoder, i.e., the so-called private game and in the second one they considered a case, where the host is available only at the encoder, i.e., public game.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, even for situations where the watermark channel does not introduce any attack, correct detection of hidden information is limited. The host interference is an inherent noise in SSW algorithms and is the main reason for the relatively low embedding rate in SSW [7].…”
mentioning
confidence: 99%
“…On the other hand, the former can be modeled as an information-theoretic problem of communications with transmitter side information. Recently, extensive research has been carried out on the data embedding problem and fundamental performance limits have been studied thoroughly, see for instance [2][3][4][5][6] and references therein. 2 Comparatively, research work in security-based watermarking is much more limited to the best of our knowledge.…”
mentioning
confidence: 99%
“…Recently, extensive research has been carried out on the data embedding problem and fundamental performance limits have been studied thoroughly, see for instance [2][3][4][5][6] and references therein. 2 Comparatively, research work in security-based watermarking is much more limited to the best of our knowledge. Ideally, one needs to show that to break a proposed secure watermarking system within perceptual constraints is equivalent to solving a hard problem in the presence of a resource-bounded adversary (by using tools from complexity theory); this is our ultimate goal.…”
mentioning
confidence: 99%
See 1 more Smart Citation