TY - GEN
T1 - A framework for the design of good watermark identification codes
AU - Moulin, Pierre
AU - Koetter, Ralf
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - The fundamental difference between the data-hiding and watermark signature verification problems was high-lighted in a 2001 paper by Steinberg and Merhav. In data hiding, the maximum number of messages that can be reliably decoded is essentially 2 nC, where n is the host sequence length and C is the data-hiding capacity. A dramatically different result is obtained for signature verification: in principle one can discriminate between a doubly exponential number of signatures: 2 2nC′, where C′ is the identification capacity. This paper proposes a practical design of codes for the latter application and compares the results with current designs in the literature.
AB - The fundamental difference between the data-hiding and watermark signature verification problems was high-lighted in a 2001 paper by Steinberg and Merhav. In data hiding, the maximum number of messages that can be reliably decoded is essentially 2 nC, where n is the host sequence length and C is the data-hiding capacity. A dramatically different result is obtained for signature verification: in principle one can discriminate between a doubly exponential number of signatures: 2 2nC′, where C′ is the identification capacity. This paper proposes a practical design of codes for the latter application and compares the results with current designs in the literature.
UR - http://www.scopus.com/inward/record.url?scp=33645696499&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33645696499&partnerID=8YFLogxK
U2 - 10.1117/12.644642
DO - 10.1117/12.644642
M3 - Conference contribution
AN - SCOPUS:33645696499
SN - 0819461121
SN - 9780819461124
T3 - Proceedings of SPIE - The International Society for Optical Engineering
BT - Security, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging
T2 - Security, Steganography, and Watermarking of Multimedia Contents VIII
Y2 - 16 January 2006 through 19 January 2006
ER -