1999
DOI: 10.1109/5.771068
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking as communications with side information

Abstract: Several authors have drawn comparison between embedded signaling or watermarking and communications, especially spread spectrum communications. We examine the similarities and differences between watermarking and traditional communications. Our comparison suggests that watermarking most closely resembles communications with side information at the transmitter and or detector, a configuration originally described by Shannon. This leads to several novel characteristics and insights regarding embedded signaling w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
224
1
3

Year Published

2002
2002
2018
2018

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 452 publications
(229 citation statements)
references
References 22 publications
1
224
1
3
Order By: Relevance
“…With the development of watermarking, many researchers found that if the whole process of digital watermarking is considered as a communication with side information [20,21], the theory of side information can be used to improve the performances of watermarking, such as the capacity, fidelity and robustness [21], and we also believe that the security of watermarking system can be effectively improved by making full use of network information theory and cryptography technology during the processes of watermark signal designing, watermark information coding, choosing embedding positions and embedding strength.…”
Section: Secure Watermarking Scheme Based On Cryptography and Side Inmentioning
confidence: 99%
“…With the development of watermarking, many researchers found that if the whole process of digital watermarking is considered as a communication with side information [20,21], the theory of side information can be used to improve the performances of watermarking, such as the capacity, fidelity and robustness [21], and we also believe that the security of watermarking system can be effectively improved by making full use of network information theory and cryptography technology during the processes of watermark signal designing, watermark information coding, choosing embedding positions and embedding strength.…”
Section: Secure Watermarking Scheme Based On Cryptography and Side Inmentioning
confidence: 99%
“…This leads to several novel characteristics and insights regarding embedded signaling. [14]. Peter Hanzlik described a steganographic system that embeds hidden data into communication channel that utilizes Reed-Solomon error-correction codes.…”
Section: IImentioning
confidence: 99%
“…In side-informed watermarking, the correlation between the watermark and the cover work is used to improve the performances, and the watermark embedding process can be described as Fig.1, where m represents the watermark, Co represents the cover work, and Cw represents the watermarked cover work. In 1999, Cox and others considered watermark as communications with side information [16]. Now, the advantages of watermarking system with side information are accepted by more and more people [1].…”
Section: Secure Watermarking Model With Side Information and Encryptionmentioning
confidence: 99%