Login / Signup
A Sufficient Condition for Private Information Hiding of Two Correlated Sources Under Multiple Access Attacks.
Yadong Wang
Yangfan Zhong
Fady Alajaji
Tamás Linder
Published in:
ISIT (2007)
Keyphrases
</>
sufficient conditions
multiple access
information hiding
watermarking scheme
communication systems
secret information
data hiding
copyright protection
digital watermarking
wireless communication
watermarking technique
lyapunov function
jpeg images
remote sensing images
multi user
watermarking algorithm
data sources
digital images
jpeg compression
wireless networks