How Can Reed-Solomon Codes Improve Steganographic Schemes?
暂无分享,去创建一个
[1] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[2] R. Crandall,et al. Some Notes on Steganography , 1999 .
[3] Jessica J. Fridrich,et al. Efficient Wet Paper Codes , 2005, Information Hiding.
[4] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[5] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[6] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[7] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[8] R. McEliece. The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes , 2003 .
[9] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[10] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[11] A. McLoughlin,et al. The complexity of computing the covering radius of a code , 1984, IEEE Trans. Inf. Theory.
[12] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[13] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[14] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[15] Rainer Böhme,et al. Exploiting Preserved Statistics for Steganalysis , 2004, Information Hiding.
[16] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[17] Antje Winkler,et al. Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.
[18] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[19] Alexander Vardy,et al. The intractability of computing the minimum distance of a code , 1997, IEEE Trans. Inf. Theory.
[20] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.