Information-Theoretic Aspects of Digital Watermarking

  1. N. Merhav, ``On random coding error exponents of watermarking systems,'' IEEE Trans. Inform. Theory, vol. 46, no. 2, pp. 420-430, March 2000.
  2. N. Merhav, ``Universal detection of messages via finite-state channels,'' IEEE Trans. Inform. Theory, vol. 46, no. 6, pp. 2242-2246, September 2000.
  3. Y. Steinberg and N. Merhav, ``Identification in the presence of side information with application to watermarking,'' IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1410-1422, May 2001.
  4. A. Somekh-Baruch and N. Merhav, ``On the error exponent and capacity games of private watermarking systems,'' IEEE Trans. Inform. Theory, vol. 49, no. 3, pp. 537-562, March 2003.
  5. A. Somekh-Baruch and N. Merhav, ``On the capacity game of public watermarking systems,'' IEEE Trans. Inform. Theory, vol. 50, no. 3, pp. 511-524, March 2004.
  6. A. Somekh-Baruch and N. Merhav, ``On the capacity game of private fingerprinting systems under collusion attacks,'' IEEE Trans. Inform. Theory, vol. 51, no. 3, pp. 884-899, March 2005.
  7. N. Merhav, ``An information-theoretic view of watermark embedding-detection and geometric attacks,'' presented at WaCha `05 , Barcelona, Spain, June 2005.
  8. A. Maor and N. Merhav, ``On joint information embedding and lossy compression,'' IEEE Trans. Inform. Theory, vol. 51, no. 8, pp. 2998-3008, August 2005.
  9. A. Maor and N. Merhav, ``On joint information embedding and lossy compression in the presence of a memoryless attack,'' IEEE Trans. Inform. Theory, vol. 51, no. 9, pp. 3166-3175, September 2005.
  10. N. Merhav and E. Ordentlich, ``On causal and semicausal codes for joint information embedding and source coding,'' IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 213-226, January 2006.
  11. N. Merhav, ``On joint coding for watermarking and encryption,'' IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 190-205, January 2006.
  12. A. Somekh-Baruch and N. Merhav, ``Achievable error exponents for the private fingerprinting game,'' in IEEE Trans. Inform. Theory, vol. 53, no. 5, pp. 1827-1838, May 2007.
  13. N. Merhav and E. Sabbag, ``Optimal watermark embedding and detection strategies under limited detection resources,'' IEEE Trans. Inform. Theory, vol. 54, no. 1, pp. 255-274, January 2008.
  14. M. Barni, A. D'Angelo, and N. Merhav, ``Stochastic image warping for improved watermark de-synchronization,'' EURASIP Journal on Information Security, vol. 2008, Aritcle ID 345184, 14 pages, 2008. doi:10.1155/2008/354184.
  15. P. Comesana, M. Barni, and N. Merhav, ``Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks,'' Proc. 2008 SPIE Conference , 2008. Full version in IEEE Trans. Inform. Theory, vol. 56, no. 6, pp. 2804-2815, June 2010.