Effects of Data Hiding on Remote Data Analysis
スポンサーリンク
概要
- 論文の詳細を見る
When digital data are distributed over an open network, they do not always keep their original bit-strings: for example, issues related to copyright protection may necessitate the use of digitally watermarked images. When we want to use a watermarking system, there is a requirement that the data be kept acceptable. Usually, the difference between the original data and the watermarked data is evaluated by human recognition; for instance, if users cannot notice the difference visually, the watermark is considered acceptable. We here suggest another scenario: if the user is not a human being but a remote computer which analyzes the digital data, the acceptance criteria might be different. This paper studies how data hiding affects remote data analysis. Specifically, a design competition among remote computers is simulated. The result suggests the importance of how the design problem is represented; smaller condition numbers of the coefficient matrix provide better robustness of the competition when the signal-to-noise ratio (SNR) is sufficiently high. This effect is demonstrated by means of a phantom-experiment study.
- 一般社団法人情報処理学会の論文
- 2001-10-15
著者
-
MATSUURA Kanta
Institute of Industrial and Science, The University of Tokyo
-
Matsuura Kanta
Institute Of Industrial Science The University Of Tokyo
-
Matsuura Kanta
Univ. Tokyo Tokyo Jpn
-
Matsuura Kanta
Institute Of Industrial And Science The University Of Tokyo
関連論文
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- A Forward Secure Identity Based Encryption Scheme with Master Key Update
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- An Implementation of KPS with Distributed Trust
- Empirical-analysis methodology for information-security investment and its application to reliable survey of Japanese firms (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Effects of Data Hiding on Remote Data Analysis
- Stateful key encapsulation mechanism (情報通信システムセキュリティ)
- Stateful key encapsulation mechanism (技術と社会・倫理)
- Stateful key encapsulation mechanism (情報セキュリティ)
- Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree
- Relations among Notions of Security for Identity Based Encryption Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes
- Empirical-Analysis Methodology for Information-Security Investment and Its Application to Reliable Survey of Japanese Firms
- Empirical-Analysis Methodology for Information-Security Investment and Its Application to Reliable Survey of Japanese Firms