In this paper, we have investigated several aspects of multiplicative spread spectrum (MSS) embedding for Data Hiding. First, we analyze the probability of error of the maximum lik...
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...