• DocumentCode
    3273469
  • Title

    On authentication with distortion constraints

  • Author

    Martinian, Emin ; Chen, Brian ; Wornell, Gregory W.

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., MIT, Cambridge, MA, USA
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    6
  • Abstract
    In many multimedia applications, there is a need to authenticate sources subjected to benign degradations such as noise, compression, etc., in addition to potential tampering attacks. Authentication can be enabled through the embedding of suitably chosen markings in the original signal. We develop one information-theoretic formulation of this problem, and identify and interpret the associated fundamental performance limits
  • Keywords
    copy protection; data encapsulation; image coding; rate distortion theory; security of data; benign degradations; compression; distortion constraints; driving license; embedded markings; fundamental performance limits; image authentication; information-theoretic formulation; multimedia applications; noise; tampering attacks; Authentication; Data encapsulation; Decoding; Degradation; Distortion measurement; Forgery; Licenses; Robustness; Watermarking; Yttrium;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory, 2001. Proceedings. 2001 IEEE International Symposium on
  • Conference_Location
    Washington, DC
  • Print_ISBN
    0-7803-7123-2
  • Type

    conf

  • DOI
    10.1109/ISIT.2001.935869
  • Filename
    935869