{"title":"Keynote speaker III: Information embedding: From theory to practice","authors":"P. Moulin","doi":"10.1109/ICSIPA.2013.6707965","DOIUrl":null,"url":null,"abstract":"Watermarking, fingerprinting, and steganography applications require the secure embedding of information bits into a cover signal (such as audio, video, still images, etc.) This talk will present the fundamental concepts and outline practical approaches to such problems. First an overview of applications is given, ranging from Digital rights management to content authentication, transaction tracking, and database annotation. Then the fundamental notions pertaining to information embedding into cover signals are presented, namely signal fidelity, robustness against an adversary, and payload. An information-theoretic model is presented for a generic data hiding problem. Analysis of this model yields the notion of data-hiding capacity and sheds light into what is the structure of good data-hiding codes. Spread-spectrum and binning codes are discussed in this context. The final part of the talk shows an application of the theory to a problem of hiding data in an image.","PeriodicalId":440373,"journal":{"name":"2013 IEEE International Conference on Signal and Image Processing Applications","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Signal and Image Processing Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIPA.2013.6707965","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Watermarking, fingerprinting, and steganography applications require the secure embedding of information bits into a cover signal (such as audio, video, still images, etc.) This talk will present the fundamental concepts and outline practical approaches to such problems. First an overview of applications is given, ranging from Digital rights management to content authentication, transaction tracking, and database annotation. Then the fundamental notions pertaining to information embedding into cover signals are presented, namely signal fidelity, robustness against an adversary, and payload. An information-theoretic model is presented for a generic data hiding problem. Analysis of this model yields the notion of data-hiding capacity and sheds light into what is the structure of good data-hiding codes. Spread-spectrum and binning codes are discussed in this context. The final part of the talk shows an application of the theory to a problem of hiding data in an image.