Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[2] Garry Howell,et al. An Introduction to Chaotic dynamical systems. 2nd Edition, by Robert L. Devaney , 1990 .
[3] Shujun Li,et al. Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.
[4] Bahram Honary. Proceedings of the 8th IMA International Conference on Cryptography and Coding , 2001 .
[5] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[6] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[7] Jacques M. Bahi,et al. A chaos-based approach for information hiding security , 2010, ArXiv.
[8] Teddy Furon,et al. Better security levels for broken arrows , 2010, Electronic Imaging.
[9] Christophe Guyeux,et al. A new chaos-based watermarking algorithm , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).