Abstract
A public multiple-access digital watermarking system is studied, in which two correlated Gaussian covertexts are watermarked independently and then sent to one authorized receiver via memoryless Gaussian attack channels. Given two distortion level pairs (D 1,D 2) and (D ′ 1,D ′ 2) with respect to the average squared error distortion measure, an achievable region is given in single-letter information quantities. An example is also utilized to illustrate the gain of correlated sources over uncorrelated sources.
This work was supported in part by the Natural Sciences and Engineering Research Council of Canada under Grants RGPIN203035-98 and RGPIN203035-02 and under Collaborative Research and Development Grant, by the Communications and Information Technology Ontario, by the Premier’s Research Excellence Award, by the Canadian Foundation for Innovation, by the Ontario Distinguished Researcher Award, and by the Canada Research Chairs Program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barron, R.J., Chen, B., Wornell, G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Trans. Inform. Theory 49, 1159–1180 (2003)
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory 47, 1423–1443 (2001)
Cohen, S., Lapidoth, A.: The Gaussian Watermarking Game. IEEE Trans. Inform. Theory 48, 1639–1667 (2002)
Costa, M.H.M.: Writing on dirty paper. IEEE Trans. Inform. Theory 29, 439–441 (1983)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, New York (1991)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Elsevier Science, Morgan Kaufmann Publishers (2001)
Gel’fand, S.I., Pinsker, M.S.: Coding for channel with random parameters. Probl. Contr. Inform. Theory 9(1), 19–31 (1980)
Merhav, N.: On Random Coding Error Exponents of Watermarking Systems. IEEE Trans. Inform. Theory 46, 420–430 (2000)
Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory 49, 563–593 (2003)
Moulin, P., Mihcak, M.K.: The Parallel-Gaussian Watermarking Game. IEEE Trans. Inform. Theory 50, 272–289 (2004)
Slepian, D., Wolf, J.K.: Noiseless coding of correlated information sources. IEEE Trans. Inform. Theory 19, 471–480 (1973)
Somekh-Baruch, A., Merhav, N.: On the Error Exponent and Capacity Games of Private Watermarking Systems. IEEE Trans. Inform. Theory 49, 537–562 (2003)
Somekh-Baruch, A., Merhav, N.: On the Capacity Game of Public Watermarking Systems. IEEE Trans. Inform. Theory 50, 511–524 (2004)
Somekh-Baruch, A., Merhav, N.: On the capacity game of private fingerprinting systems under collusion attacks, available at http://www-ee.technion.ac.il/~merhav/
Su, J.K., Eggers, J.J., Girod, B.: Capacity of Digital Watermarks Subjected to an Optimal Collusion Attack. In: European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland (September 2000)
Sun, W., Yang, E.H.: On the Capacity Regions of Public Multiple-Access Digital Watermarking Systems (in preparation)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, W., Yang, Eh. (2004). On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-30114-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24207-9
Online ISBN: 978-3-540-30114-1
eBook Packages: Computer ScienceComputer Science (R0)