The Square Root Law in Stegosystems with Imperfect Information
暂无分享,去创建一个
[1] Jana Dittmann,et al. Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .
[2] Andrew D. Ker. Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.
[3] John Langford,et al. Provably secure steganography: (Extended abstract) , 2002, CRYPTO 2002.
[4] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[5] Rainer Böhme,et al. Improved statistical steganalysis using models of heterogeneous cover signals , 2009 .
[6] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[7] Andrew D. Ker. The square root law requires a linear key , 2009, MM&Sec '09.
[8] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[9] S. Ravi. Testing Statistical Hypotheses, 3rd edn by E. L. Lehmann and J. P. Romano , 2007 .
[10] Andrew D. Ker. THE UNIFORM PRIOR AND ZERO INFORMATION : A TECHNICAL NOTE , 2010 .
[11] Edward J. Delp,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[12] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[13] Rainer Böhme,et al. An Epistemological Approach to Steganography , 2009, Information Hiding.
[14] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[15] Ronald L. Graham,et al. Concrete Mathematics, a Foundation for Computer Science , 1991, The Mathematical Gazette.
[16] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[17] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[18] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[19] Andrew D. Ker. The square root law does not require a linear key , 2010, MM&Sec '10.
[20] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[21] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Ying Wang,et al. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.