Information-Theoretic Aspects of Digital Watermarking
-
N. Merhav,
``On random coding error exponents of watermarking systems,''
IEEE Trans. Inform. Theory, vol. 46, no. 2, pp. 420-430, March 2000.
-
N. Merhav,
``Universal detection of messages via finite-state channels,''
IEEE Trans. Inform. Theory,
vol. 46, no. 6, pp. 2242-2246, September 2000.
-
Y. Steinberg and N. Merhav,
``Identification in the presence of side
information with application to watermarking,''
IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1410-1422,
May 2001.
-
A. Somekh-Baruch and N. Merhav,
``On the error exponent and capacity
games of private watermarking systems,''
IEEE Trans. Inform. Theory, vol. 49, no. 3, pp. 537-562, March 2003.
-
A. Somekh-Baruch and N. Merhav,
``On the capacity game of public watermarking systems,''
IEEE Trans. Inform. Theory, vol. 50, no. 3, pp. 511-524, March 2004.
-
A. Somekh-Baruch and N. Merhav,
``On the capacity game of private fingerprinting systems under
collusion attacks,''
IEEE Trans. Inform. Theory, vol. 51, no. 3, pp. 884-899, March 2005.
-
N. Merhav,
``An information-theoretic view of watermark embedding-detection and
geometric attacks,'' presented at WaCha `05 ,
Barcelona, Spain, June 2005.
-
A. Maor and N. Merhav,
``On joint information embedding and lossy compression,''
IEEE Trans. Inform. Theory, vol. 51, no. 8, pp. 2998-3008,
August 2005.
-
A. Maor and N. Merhav,
``On joint information embedding
and lossy compression in the presence of a memoryless attack,''
IEEE Trans. Inform. Theory, vol. 51, no. 9, pp. 3166-3175,
September 2005.
-
N. Merhav and E. Ordentlich,
``On causal and semicausal codes for joint information embedding and
source coding,''
IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 213-226, January 2006.
-
N. Merhav,
``On joint coding for watermarking and encryption,''
IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 190-205, January 2006.
-
A. Somekh-Baruch and N. Merhav,
``Achievable error exponents for the private fingerprinting game,''
in IEEE Trans. Inform.
Theory, vol. 53, no. 5, pp. 1827-1838, May 2007.
-
N. Merhav and E. Sabbag,
``Optimal watermark embedding and detection
strategies under limited detection resources,''
IEEE Trans. Inform. Theory, vol. 54, no. 1, pp. 255-274, January 2008.
-
M. Barni, A. D'Angelo, and N. Merhav,
``Stochastic image warping for
improved watermark de-synchronization,''
EURASIP Journal on Information Security, vol. 2008, Aritcle ID
345184, 14 pages, 2008. doi:10.1155/2008/354184.
-
P. Comesana, M. Barni, and N. Merhav,
``Asymptotically optimum embedding
strategy for one-bit watermarking under Gaussian attacks,''
Proc. 2008 SPIE Conference , 2008.
Full version in
IEEE Trans. Inform. Theory, vol. 56, no. 6, pp. 2804-2815, June
2010.