Sciweavers

14 search results - page 3 / 3
» An improved attack analysis on a public-key spread spectrum ...
Sort
View
IWDW
2005
Springer
14 years 29 days ago
Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques
Abstract. Many coded digital watermarking systems development requires first the selection of a (uncoded) modulation technique to be part of a coded architecture. Therefore, perfo...
Marcos de Castro Pacitti, Weiler Alves Finamore
PRL
2007
107views more  PRL 2007»
13 years 7 months ago
Robust SS watermarking with improved capacity
Robustness is a key attribute of spread spectrum (SS) watermarking scheme. It is significantly deteriorated if one tries to achieve high embedding rate keeping other parameters u...
Santi P. Maity, Malay K. Kundu, Tirtha S. Das
IWDW
2005
Springer
14 years 29 days ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
INFOCOM
2008
IEEE
14 years 1 months ago
Dynamic Jamming Mitigation for Wireless Broadcast Networks
—Wireless communications are inherently symmetric; that is, it takes an attacker the same amount of power to modulate a signal as it does for a legitimate node to modulate the sa...
Jerry T. Chiang, Yih-Chun Hu