This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Massachusetts Institute of Technology Handout 16 6.857: Network and Computer Security October 30, 2003 Professor Ronald L. Rivest Problem Set 5 This problem set is due on paper, on Thursday, November 6 at the beginning of class. You are to work on this problem set in groups of three or four people. Problems turned in by individuals, pairs, pentuples, etc. will not be accepted. Be sure that all group members can explain the solutions. See Handout 1 ( Course Information ) for our policy on collaboration. If you do not have a group, seek partners by emailing TA . Homework must be typed! Each problem answer must appear on separate sheets of paper. Mark the top of each sheet with your names (alphabetically by last name), the course number (6.857), the problem set number and question, and the date. Homework must be typed and clear. We have provided templates for L A T E X and Microsoft Word on the course website. Grading and Late Policy: Each problem is worth 10 points, except where noted. Late homework will not be accepted without prior approval. Homework should not be submitted by email except with prior approval. ( Somebody from your group should be in class on the day that the homework is due.) With the authors permission, we will distribute our favorite solution to each problem as the ocial solution this is your chance to become famous! If you do not wish for your homework to be used as an ocial solution, or if you wish that it only be used anonymously, please note this on your homework. Problem 5-1. Watermarking (a) Evaluate the following watermarking schemes. Consider the approximate density of marks (i.e., how many kilo/megabytes of data are required per mark, and how many marks one could expect to embed in the item in question), the eciency of the marking and extraction procedures, whether the marks are perceptible (when comparing the marked version to the original), and whether the marks are resistant to detection and/or removal (ignoring the possibility of collusion). Limit each of your answers to 1/4 page....
View Full Document
- Spring '03
- Computer Security