語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection- and information-theoretic...
~
Wang, Ying.
FindBook
Google Book
Amazon
博客來
Detection- and information-theoretic analysis of steganography and fingerprinting.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Detection- and information-theoretic analysis of steganography and fingerprinting./
作者:
Wang, Ying.
面頁冊數:
137 p.
附註:
Adviser: Pierre Moulin.
Contained By:
Dissertation Abstracts International68-02B.
標題:
Engineering, Electronics and Electrical. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3250343
Detection- and information-theoretic analysis of steganography and fingerprinting.
Wang, Ying.
Detection- and information-theoretic analysis of steganography and fingerprinting.
- 137 p.
Adviser: Pierre Moulin.
Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.
The proliferation of multimedia and the advent of the Internet and other public networks have created many new applications of information hiding in multimedia security and forensics. This dissertation focuses on two of these application scenarios: steganography (and its counter problem steganalysis) and fingerprinting.Subjects--Topical Terms:
626636
Engineering, Electronics and Electrical.
Detection- and information-theoretic analysis of steganography and fingerprinting.
LDR
:02249nam 2200277 a 45
001
965629
005
20110906
008
110906s2006 eng d
035
$a
(UMI)AAI3250343
035
$a
AAI3250343
040
$a
UMI
$c
UMI
100
1
$a
Wang, Ying.
$3
558207
245
1 0
$a
Detection- and information-theoretic analysis of steganography and fingerprinting.
300
$a
137 p.
500
$a
Adviser: Pierre Moulin.
500
$a
Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1203.
502
$a
Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.
520
$a
The proliferation of multimedia and the advent of the Internet and other public networks have created many new applications of information hiding in multimedia security and forensics. This dissertation focuses on two of these application scenarios: steganography (and its counter problem steganalysis) and fingerprinting.
520
$a
First, from a detection-theoretic perspective, we quantify the detectability of commonly used information-hiding techniques such as spread spectrum and distortion-compensated quantization index modulation, and also the detectability of block-based steganography. We devise a practical steganalysis method that exploits the peculiar block structure of block-DCT image steganography. To cope with the twin difficulties of unknown image statistics and unknown steganographic codes, we explore image steganalysis based on supervised learning and build an optimized classifier that outperforms previously proposed image steganalysis methods.
520
$a
Then, from an information-theoretic perspective, we derive the capacity and random-coding error exponent of perfectly secure steganography and public fingerprinting. For both games, a randomized stacked-binning scheme and a matched maximum penalized mutual information decoder are used to achieve capacity and to realize a random-coding error exponent that is strictly positive at all rates below capacity.
590
$a
School code: 0090.
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
710
2 0
$a
University of Illinois at Urbana-Champaign.
$3
626646
773
0
$t
Dissertation Abstracts International
$g
68-02B.
790
$a
0090
790
1 0
$a
Moulin, Pierre,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3250343
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9125230
電子資源
11.線上閱覽_V
電子書
EB W9125230
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入