DocumentCode
3273469
Title
On authentication with distortion constraints
Author
Martinian, Emin ; Chen, Brian ; Wornell, Gregory W.
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., MIT, Cambridge, MA, USA
fYear
2001
fDate
2001
Firstpage
6
Abstract
In many multimedia applications, there is a need to authenticate sources subjected to benign degradations such as noise, compression, etc., in addition to potential tampering attacks. Authentication can be enabled through the embedding of suitably chosen markings in the original signal. We develop one information-theoretic formulation of this problem, and identify and interpret the associated fundamental performance limits
Keywords
copy protection; data encapsulation; image coding; rate distortion theory; security of data; benign degradations; compression; distortion constraints; driving license; embedded markings; fundamental performance limits; image authentication; information-theoretic formulation; multimedia applications; noise; tampering attacks; Authentication; Data encapsulation; Decoding; Degradation; Distortion measurement; Forgery; Licenses; Robustness; Watermarking; Yttrium;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory, 2001. Proceedings. 2001 IEEE International Symposium on
Conference_Location
Washington, DC
Print_ISBN
0-7803-7123-2
Type
conf
DOI
10.1109/ISIT.2001.935869
Filename
935869
Link To Document