A new paradigm hidden in steganography
暂无分享,去创建一个
[1] Cynthia E. Irvine,et al. Surmounting the Effects of Lossy Compression on Steganography , 1996 .
[2] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[3] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[4] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[5] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[6] Mark Ettinger,et al. Steganalysis and Game Equilibria , 1998, Information Hiding.
[7] Marten van Dijk. On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.
[8] Robert Rosen,et al. Structural stability and morphogenesis , 1977 .
[9] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[10] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[13] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[14] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[15] Ross Anderson,et al. Information hiding terminology , 1996 .
[16] David Kahn,et al. The History of Steganography , 1996, Information Hiding.
[17] Ira S. Moskowitz,et al. Critical analysis of security in voice hiding techniques , 1997, ICICS.
[18] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[19] Gustavus J. Simmons,et al. A Secure Subliminal Channel (?) , 1985, CRYPTO.
[20] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[21] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[22] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..