This paper reviews the fundamentals of the data hiding problem. Data hiding can be viewed as a game between two teams (embedder/decoder vs attacker), and optimal data-hiding and attack strategies may be developed in this context. This paper presents a framework for developing such strategies as well as practical codes. The theory is applied to image watermarking examples.
|Original language||English (US)|
|Title of host publication||Mathematics And Computation In Imaging Science And Information Processing|
|Publisher||World Scientific Publishing Co.|
|Number of pages||46|
|State||Published - Jan 1 2007|
ASJC Scopus subject areas
- Computer Science(all)