The Provable Extracting Security of Information Hiding
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.
[2] Deng-Guo Feng. Research on Theory and Approach of Provable Security , 2005 .
[3] Li Shi-qu,et al. Information-theoretic analysis for the difficulty of extracting hidden information , 2008, Wuhan University Journal of Natural Sciences.
[4] Jessica J. Fridrich,et al. Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.
[5] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[6] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[7] Jian Wang,et al. Random Oracle Model of Information Hiding System , 2008 .