A Sufficient Condition for Private Information Hiding of Two Correlated Sources Under Multiple Access Attacks.
Yadong WangYangfan ZhongFady AlajajiTamás LinderPublished in: ISIT (2007)
Keyphrases
- sufficient conditions
- multiple access
- information hiding
- watermarking scheme
- communication systems
- secret information
- data hiding
- copyright protection
- digital watermarking
- wireless communication
- watermarking technique
- lyapunov function
- jpeg images
- remote sensing images
- multi user
- watermarking algorithm
- data sources
- digital images
- jpeg compression
- wireless networks