On authentication with distortion constraints
暂无分享,去创建一个
In many multimedia applications, there is a need to authenticate sources subjected to benign degradations such as noise, compression, etc., in addition to potential tampering attacks. Authentication can be enabled through the embedding of suitably chosen markings in the original signal. We develop one information-theoretic formulation of this problem, and identify and interpret the associated fundamental performance limits.
[1] Emin Martinian,et al. Authenticating multimedia in the presence of noise , 2000 .
[2] Gregory W. Wornell,et al. Information theoretic approach to the authentication of multimedia , 2001, IS&T/SPIE Electronic Imaging.
[3] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.