Chaotic iterations for steganography - Stego-security and chaos-security
暂无分享,去创建一个
[1] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[2] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[3] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[4] Stefan Katzenbeisser,et al. Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens , 2006, Information Hiding.
[5] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[6] Garry Howell,et al. An Introduction to Chaotic dynamical systems. 2nd Edition, by Robert L. Devaney , 1990 .
[7] Mauro Barni,et al. A general framework for robust watermarking security , 2003, Signal Process..
[8] Jacques M. Bahi,et al. A chaos-based approach for information hiding security , 2010, ArXiv.
[9] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[10] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[11] Fernando Pérez-González,et al. Secret dither estimation in lattice-quantization data hiding: a set membership approach , 2006, Electronic Imaging.
[12] Jana Dittmann,et al. Malicious attacks on media authentication schemes based on invertible watermarks , 2004, IS&T/SPIE Electronic Imaging.
[13] Christophe Guyeux,et al. A new chaos-based watermarking algorithm , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[14] J. Banks,et al. On Devaney's definition of chaos , 1992 .
[15] Shujun Li,et al. Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.
[16] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[17] Jacques M. Bahi,et al. Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[19] M. Bernhard. Introduction to Chaotic Dynamical Systems , 1992 .
[20] Josep Domingo-Ferrer,et al. On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems , 2008, Trans. Data Priv..
[21] Josep Domingo-Ferrer,et al. A Shared Steganographic File System with Error Correction , 2008, MDAI.