Joachim J. Eggers

Learn More
1 Research on information embedding and particularly information hiding techniques has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new(More)
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has been proposed by Cachin. A steganographic system is(More)
Digital watermarking is the process of introducing small modifications into a copy of a digital document that can be detected later. The embedded information can be used to determine the document’s owner or simply to distinguish several copies. However, coincidental or malicious “attacks” can degrade the robustness of watermark detection. Here, uniform(More)
Digital watermarks are signals embedded in multimedia data to allow copyright enforcement. In most watermarking schemes the embedded signal must be known for watermark detection, which leads to severe security risks. Van Schyndel et al. proposed a public watermark detection principle that works without explicit reference to the embedded signal. In this(More)
New blind digital watermarking schemes that are optimized for additive white Gaussian noise (AWGN) attacks have been developed by several research groups within the last two years. Currently, the most ef£cient schemes, e.g., the scalar Costa scheme (SCS), involve scalar quantization of the host signal during watermarking embedding and watermark reception.(More)
One envisioned application of digital watermarking is fingerprinting, in which different information is embedded into several copies of the same original signal. Several attackers may collude by combining their copies to produce an attacked signal. In the case of independent watermarks, a collusion-attack model is presented and shown to be analogous to the(More)
s: English and German provided Tables: None Figures: 15 Galley proofs: Please send galley proofs to J. K. Su at the MIT Lincoln Laboratory address given above. Telephone: +1-781-981-4188, fax: +1-781-981-7271, email: su@ll.mit.edu. Abstract Using a theoretical approach based on random processes, signal processing, and information theory, we study the(More)
Digital watermarking is a technology which potentially can be used to enforce the copyrights and integrity of digital multimedia data. In this paper, a communications perspective on digital watermarking is used to compute upper performance limits on blind digital watermarking for simple AWGN attacks and attacks by amplitude scaling and additive white noise.(More)