Paper Abstract and Keywords |
Presentation |
2006-03-16 17:10
An Algorithm for Computing the Hiding Capacity of Information Hiding Kensuke Yasui, Tota Suko, Toshiyasu Matsushima (Waseda Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
There are digital watermarking and fingerprinting (generically calling information hiding) as technique to protect illegal copy or redistribution of digital contents such as images, audio, and video. These are techniques which hide information related to author (user) under contents on the condition that it is imperceptible.
Information hiding requires the property that hidden information isn't erased after suffering transformation (data compression, signal processing, etc). The supremum of information rates which can be decoded from contents without error after transformation calls hiding capacity.
Moulin et al. formalized information hiding by information theoretic analysis and obtained hiding capacity, but they didn't compute it. In this paper, we propose an algorithm to compute hiding capacity by applying Arimoto-Blahut algorithm. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Arimoto-Blahut algorithm / channel capacity / hiding capacity / information hiding / digital watermarking / fingerprinting / / |
Reference Info. |
IEICE Tech. Rep., vol. 105, no. 661, IT2005-94, pp. 177-182, March 2006. |
Paper # |
IT2005-94 |
Date of Issue |
2006-03-09 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
WBS IT ISEC |
Conference Date |
2006-03-16 - 2006-03-17 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Nagoya Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
IT |
Conference Code |
2006-03-WBS-IT-ISEC |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
An Algorithm for Computing the Hiding Capacity of Information Hiding |
Sub Title (in English) |
|
Keyword(1) |
Arimoto-Blahut algorithm |
Keyword(2) |
channel capacity |
Keyword(3) |
hiding capacity |
Keyword(4) |
information hiding |
Keyword(5) |
digital watermarking |
Keyword(6) |
fingerprinting |
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kensuke Yasui |
1st Author's Affiliation |
Waseda University (Waseda Univ.) |
2nd Author's Name |
Tota Suko |
2nd Author's Affiliation |
Waseda University (Waseda Univ.) |
3rd Author's Name |
Toshiyasu Matsushima |
3rd Author's Affiliation |
Waseda University (Waseda Univ.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2006-03-16 17:10:00 |
Presentation Time |
25 minutes |
Registration for |
IT |
Paper # |
IT2005-94, ISEC2005-151, WBS2005-108 |
Volume (vol) |
vol.105 |
Number (no) |
no.661(IT), no.663(ISEC), no.665(WBS) |
Page |
pp.177-182 |
#Pages |
6 |
Date of Issue |
2006-03-09 (IT, ISEC, WBS) |
|