Where to Hide the Bits ?
暂无分享,去创建一个
Rainer Böhme | Benjamin Johnson | Pascal Schöttle | Benjamin Johnson | Rainer Böhme | Pascal Schöttle
[1] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[2] Rainer Böhme,et al. A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.
[3] Ying Wang,et al. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.
[4] Jessica J. Fridrich,et al. Minimizing the embedding impact in steganography , 2006, MM&Sec '06.
[5] Jessica J. Fridrich,et al. Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.
[6] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[7] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[8] John Langford,et al. Provably Secure Steganography , 2009, IEEE Trans. Computers.
[9] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[10] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[11] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[12] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[13] Andrew D. Ker. The Square Root Law in Stegosystems with Imperfect Information , 2010, Information Hiding.
[14] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[15] Edward J. Delp,et al. Media Forensics and Security , 2009 .
[16] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..