The square root law requires a linear key
暂无分享,去创建一个
[1] Andrew D. Ker. Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Jessica J. Fridrich,et al. Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.
[4] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[5] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[6] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[7] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[8] Andrew D. Ker. Locating steganographic payload via ws residuals , 2008, MM&Sec '08.
[9] Andrew D. Ker. Steganographic strategies for a square distortion function , 2008, Electronic Imaging.
[10] Andrew D. Ker,et al. Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[13] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[14] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[15] Jessica J. Fridrich,et al. Complete characterization of perfectly secure stego-systems with mutually independent embedding operation , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.