This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
A complete error resilient video transmission codec is presented, utilizing imperceptible embedded information for combined detecting, resynchronization and reconstruction of the ...
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...