Discreet signaling: From the Chinese emperors to the internet

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For thousands of years, humans have sought means to secretly communicate. Today, ad hoc signaling methods are used in applications as varied as digital rights management for multimedia, content identification, authentication, steganography, transaction tracking, and networking. This talk will present an information-theoretic framework for analyzing such problems and designing provably good signaling schemes. Key ingredients of the framework include models for the signals being communicated and the degradations, jammers, eavesdroppers and codebreakers that may be encountered during transmission.

Original languageEnglish (US)
Title of host publicationMultimedia Content Representation, Classification and Security - International Workshop, MRCS 2006. Proceedings
PublisherSpringer-Verlag Berlin Heidelberg
Number of pages1
ISBN (Print)3540393927, 9783540393924
DOIs
StatePublished - Jan 1 2006
EventInternational Workshop on Multimedia Content Representation, Classification and Security, MRCS 2006 - Istanbul, Turkey
Duration: Sep 11 2006Sep 13 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4105 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Workshop on Multimedia Content Representation, Classification and Security, MRCS 2006
CountryTurkey
CityIstanbul
Period9/11/069/13/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Discreet signaling: From the Chinese emperors to the internet'. Together they form a unique fingerprint.

  • Cite this

    Moulin, P. (2006). Discreet signaling: From the Chinese emperors to the internet. In Multimedia Content Representation, Classification and Security - International Workshop, MRCS 2006. Proceedings (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4105 LNCS). Springer-Verlag Berlin Heidelberg. https://doi.org/10.1007/11848035_7