2007
DOI: 10.1117/12.704379
|View full text |Cite
|
Sign up to set email alerts
|

Trellis coded modulation to improve dirty paper trellis watermarking

Abstract: Lattice codes and quantization-based techniques have received considerable attention as a method of digital watermarking with side information. However, these algorithms are also recognized to be highly sensitive to common signal processing primitives such as valuemetric scaling, e.g. changes in volume of a song, or re-quantization, e.g. JPEG compression. Hence, it is reasonable to investigate alternative codes which may offer the potential for superior performance. In previous work, we designed a new class of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2007
2007
2011
2011

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 24 publications
(30 reference statements)
0
4
0
Order By: Relevance
“…This method implicitly assumes that a different pattern is attached to each arc in the trellis. Therefore, it will fail to deal with the recent improvements proposed for DPT watermarking based on trellis coded modulation [14].…”
Section: Connections and State Estimationmentioning
confidence: 99%
“…This method implicitly assumes that a different pattern is attached to each arc in the trellis. Therefore, it will fail to deal with the recent improvements proposed for DPT watermarking based on trellis coded modulation [14].…”
Section: Connections and State Estimationmentioning
confidence: 99%
“…In digital watermarking, the same problem is extended by an attack channel between the sender and the receiver, which calls for a combination of good source and channel codes. This combination can be implemented using nested convolutional (trellis) codes and is better known as Dirty-paper codes [46]. Different practical application of the binning concept is in the distributed source coding problem [43].…”
Section: G Stcs In Context Of Other Workmentioning
confidence: 99%
“…The trellis structure and the codeword construction should also be clarified as exposed in. 16 Security of our approach should also be evaluated as it has been done for the original DPTC in 5 and for the Broken Arrows algorithm in. 10…”
Section: Resultsmentioning
confidence: 99%