Modeling the Security of Steganographic Systems
暂无分享,去创建一个
Hannes Federrath | Herbert Klimant | Rudi Piotraschke | Andreas Pfitzmann | Andreas Westfeld | Guntram Wicke | Gritta Wolf | Jan Zöllner | A. Pfitzmann | H. Federrath | Andreas Westfeld | Guntram Wicke | Gritta Wolf | Jan Zöllner | Herbert Klimant | Rudi Piotraschke
[1] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[2] Ross Anderson,et al. Information hiding terminology , 1996 .
[3] Andreas Westfeld,et al. Steganography in a Video Conferencing System , 1998, Information Hiding.
[4] R. Gallager. Information Theory and Reliable Communication , 1968 .
[5] Birgit Pfitzmann,et al. Digital Signature Schemes , 1996, Lecture Notes in Computer Science.
[6] Herbert Klimant,et al. Informationstheoretische Bewertung steganographischer Konzelationssysteme , 1997, Verläßliche IT-Systeme.
[7] D. A. Bell,et al. Information Theory and Reliable Communication , 1969 .
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Hannes Federrath,et al. Über die Modellierung steganographischer Systeme , 1997, Verläßliche IT-Systeme.