Square root law for communication with low probability of detection on AWGN channels
暂无分享,去创建一个
[1] E. Majani,et al. A model for the study of very noisy channels, and applications , 1988 .
[2] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[3] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[4] W. Marsden. I and J , 2012 .
[5] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] G. Forney,et al. Random codes: minimum distances and error exponents , 2002, Proceedings IEEE International Symposium on Information Theory,.
[8] Evgueni A. Haroutunian,et al. Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.
[9] H. V. Trees,et al. Part I. Detection, Estimation, and Linear Modulation Theory , 2013 .
[10] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Andrew D. Ker. The square root law requires a linear key , 2009, MM&Sec '09.
[13] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[14] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[17] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[18] Lang Tong,et al. The Embedding Capacity of Information Flows Under Renewal Traffic , 2011, IEEE Transactions on Information Theory.
[19] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[20] Marco Chiani,et al. New exponential bounds and approximations for the computation of error probability in fading channels , 2003, IEEE Trans. Wirel. Commun..
[21] N. D. Memon,et al. Steganography capacity: a steganalysis perspective , 2003, IS&T/SPIE Electronic Imaging.
[22] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[23] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[24] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.
[25] Van Trees,et al. Detection, Estimation, and Modulation Theory. Part 1 - Detection, Estimation, and Linear Modulation Theory. , 1968 .
[26] Alexander Barg,et al. Random codes: Minimum distances and error exponents , 2002, IEEE Trans. Inf. Theory.
[27] Donald F. Towsley,et al. Square root law for communication with low probability of detection on AWGN channels , 2012, ISIT.
[28] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[29] Andrew D. Ker. Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.
[30] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[31] George Danezis,et al. A Survey of Anonymous Communication Channels , 2008 .
[32] Upamanyu Madhow. Fundamentals of Digital Communication: References , 2008 .
[33] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[34] Andrew D. Ker. The square root law does not require a linear key , 2010, MM&Sec '10.
[35] M. Melamed. Detection , 2021, SETI: Astronomy as a Contact Sport.
[36] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.