Download An Implementation of Key-Based Digital Signal Steganography by Sharp PDF

By Sharp

Show description

Read Online or Download An Implementation of Key-Based Digital Signal Steganography PDF

Best computers books

Osborne Schaum's Outline Of Principles Of Computer Science

Study the necessities of laptop science
Schaum’s define of ideas of computing device technology offers a concise evaluation of the theoretical beginning of laptop technological know-how. it is usually targeted evaluation of object-oriented programming utilizing Java.

Runtime Verification: 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papers

Runtime veri? cation is a up to date course in formal tools learn, that's complementary to such well-established formal veri? cation tools as version checking. learn in runtime veri? cation offers with formal languages appropriate for expressing method houses which are checkable at run time; algorithms for checking of formal homes over an execution hint; low-overhead technique of extracting info from the operating procedure that's su?

Extra resources for An Implementation of Key-Based Digital Signal Steganography

Sample text

For blind detection, error probabilities down to 1% are measured. Note, that this is the result for one sub-channel. g. [1]). Fig. 14 shows clearly that the measured detection error probabilities agree with those predicted using the generalized Gaussian model or by measuring the cross-correlation and its variance for all 200 simulations. The error probabilities for sub-channel 1 and 22 are not plotted. Due to the small embedding strength for sub-channel 1, it is impossible to detect the watermark in this sub-channel with a blind detector.

Gray and T. G. Stockham, “Dithered quantizers,” IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 805–812, May 1993. [24] N. S. Jayant and P. Noll, Digital Coding of Waveforms, Prentice Hall, 1984. [25] L. Schuchman, “Dither signals and their effect on quantization noise,” IEEE Transaction on Communication Technology (COM), vol. 12, pp. 162–165, December 1964. [26] G. Nicchiotti and E. Ottaviani, “Non-invertible statistical wavelet watermarking,” in Proceedings European Signal Processing Conference (EUSIPCO 98), Greece, September 1998, vol.

1, pp. 13–16. -P. Linnartz, T. Kalker, and J. Haitsma, “Detecting electronic watermarks in digital video,” in Proceedings of the IEEE Intl. Conference on Speech and Signal Processing 1999 (ICASSP 99), Phoenix, USA, April 1999. [16] L. Xie and G. R. Arce, “A Blind Wavelet Based Digital Signature for Image Authentication,” in Proceedings European Signal Processing Conference (EUSIPCO 98), Greece, September 1998, vol. 1, pp. 21–24. [17] J. R. Hern´andez and F. P´erez-Gonz´alez, “Statistical Analysis of Watermarking Schemes for Copyright Protection of Images,” Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, vol.

Download PDF sample

Rated 4.83 of 5 – based on 34 votes