Asymptotic Behavior of the ZZW Embedding Construction
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[2] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[3] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[4] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[5] R. Crandall,et al. Some Notes on Steganography , 1999 .
[6] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[7] Jessica J. Fridrich,et al. Efficient Wet Paper Codes , 2005, Information Hiding.
[8] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[9] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[10] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[11] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[12] Jessica J. Fridrich,et al. Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes , 2007, ArXiv.