@inproceedings{049de67d76494b82b8329522c15ed842,
title = "Applying Erez and ten Brink's dirty paper codes to data-hiding",
abstract = "Structured codes are known to be necessary in practical implementations of capacity-approaching {"}dirty paper schemes{"}. In this paper we study the performance of a recently proposed dirty paper technique, by Erez and ten Brink which, to the authors' knowledge, is firstly applied to data-hiding, and compare it with other existing approaches. Specifically, we compare it with conventional side-informed schemes previously used in data-hiding based on repetition and turbo coding. We show that a significant improvement can be achieved using Erez and ten Brink's proposal. We also study the considerations we have to take into account when these codes are used in data-hiding, mainly related with perceptual questions.",
author = "Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and Willems, {Frans M.J.}",
year = "2005",
month = jul,
day = "21",
doi = "10.1117/12.587769",
language = "English",
series = "Proceedings of SPIE",
publisher = "SPIE",
pages = "298--307",
editor = "Delp, {Edward J.} and Wong, {Ping W.}",
booktitle = "Security, Steganography, and Watermarking of Multimedia Contents VII",
address = "United States",
note = "Security, Steganography, and Watermarking of Multimedia Contents VII ; Conference date: 21-04-2005 Through 21-04-2005",
}