一般最坏情况下最优水印嵌入与检测策略

E. Sabbag, N. Merhav
{"title":"一般最坏情况下最优水印嵌入与检测策略","authors":"E. Sabbag, N. Merhav","doi":"10.1109/ISIT.2007.4557586","DOIUrl":null,"url":null,"abstract":"We revisit the problem of optimal watermark embedding and detection for computationally limited detectors under general attack channels. First, a formal definition of the problem is given for general attack channels under the Neyman-Pearson criterion of optimality. Later, asymptotically optimal decision regions are offered, assuming that the detector is computationally limited and that the attack channel is strongly exchangeable. These results are extended to general attack channels where random watermark sequences are considered. The optimal embedding rule is offered and the worst attack channel is identified.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks\",\"authors\":\"E. Sabbag, N. Merhav\",\"doi\":\"10.1109/ISIT.2007.4557586\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We revisit the problem of optimal watermark embedding and detection for computationally limited detectors under general attack channels. First, a formal definition of the problem is given for general attack channels under the Neyman-Pearson criterion of optimality. Later, asymptotically optimal decision regions are offered, assuming that the detector is computationally limited and that the attack channel is strongly exchangeable. These results are extended to general attack channels where random watermark sequences are considered. The optimal embedding rule is offered and the worst attack channel is identified.\",\"PeriodicalId\":193467,\"journal\":{\"name\":\"2007 IEEE International Symposium on Information Theory\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Symposium on Information Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT.2007.4557586\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Symposium on Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2007.4557586","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

我们重新研究了在一般攻击信道下计算量有限的检测器的最优水印嵌入和检测问题。首先,在最优性的Neyman-Pearson准则下给出了一般攻击通道问题的形式化定义。然后,假设检测器的计算量是有限的,并且攻击通道是强交换的,给出了渐近最优决策区域。将这些结果推广到考虑随机水印序列的一般攻击信道中。给出了最优嵌入规则,识别了最坏攻击通道。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimal Watermark Embedding and Detection Strategies Under General Worst Case Attacks
We revisit the problem of optimal watermark embedding and detection for computationally limited detectors under general attack channels. First, a formal definition of the problem is given for general attack channels under the Neyman-Pearson criterion of optimality. Later, asymptotically optimal decision regions are offered, assuming that the detector is computationally limited and that the attack channel is strongly exchangeable. These results are extended to general attack channels where random watermark sequences are considered. The optimal embedding rule is offered and the worst attack channel is identified.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信