Generalization of the ZZW Embedding Construction for Steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[2] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[3] Jessica J. Fridrich,et al. Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.
[4] Jessica J. Fridrich,et al. Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.
[5] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[6] R. Crandall,et al. Some Notes on Steganography , 1999 .
[7] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[8] Jessica J. Fridrich,et al. Efficient Wet Paper Codes , 2005, Information Hiding.
[9] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[10] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[11] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[12] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[13] Jessica J. Fridrich,et al. Minimizing the embedding impact in steganography , 2006, MM&Sec '06.
[14] Antje Winkler,et al. Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.
[15] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[16] Marten van Dijk,et al. Capacity and codes for embedding information in gray-scale signals , 2005, IEEE Transactions on Information Theory.
[17] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[18] Carlos Munuera,et al. Steganography and error-correcting codes , 2007, Signal Process..