-
1
-
-
0012085074
-
Information hiding: First international workshop
-
Springer-Verlag
-
R.J. Anderson, editor: Information Hiding: First International Workshop, vol. 1174 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
-
-
Anderson, R.J.1
-
2
-
-
84955563192
-
Stretching the limits of steganography
-
R. Anderson, editor, Information Hiding: First International Workshop, Springer-Verlag
-
R.J. Anderson: Stretching the Limits of Steganography, In R. Anderson, editor, Information Hiding: First International Workshop, vol. 1174 of LNCS, pp. 39-48. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 39-48
-
-
Anderson, R.J.1
-
5
-
-
0012085074
-
Information hiding: Second international workshop
-
Springer-Verlag
-
D. Aucsmith, editor: Information Hiding: Second International Workshop, vol. 1525 of Lecture Notes in Computer Science. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
-
-
Aucsmith, D.1
-
6
-
-
84957868624
-
An information-theoretic model for steganography
-
D. Aucsmith, editor, Information Hiding: Second International Workshop, Springer-Verlag
-
C. Cachin: An Information-Theoretic Model for Steganography In D. Aucsmith, editor, Information Hiding: Second International Workshop, vol. 1525 of LNCS, pp. 306-318. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
7
-
-
4544318088
-
Critical analysis of security in voice hiding techniques
-
Y. Han, T. Okamoto, and S. Qing, editors, Information and Communications Security: First International Conference, Springer-Verlag
-
L. Chang and I.S. Moskowitz Critical Analysis of Security in Voice Hiding Techniques In Y. Han, T. Okamoto, and S. Qing, editors, Information and Communications Security: First International Conference, vol. 1334 of Lecture Notes in Computer Science, pp. 203-216, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 203-216
-
-
Chang, L.1
Moskowitz, I.S.2
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar: Broadcast Channels with Confidential Messages IEEE Transaction on Information Theory, V. IT-24, No. 3, pp. 339-349, May 1978.
-
(1978)
IEEE Transaction on Information Theory
, vol.IT-24
, Issue.3
, pp. 339-349
-
-
Csiszar, I.1
-
9
-
-
0001868835
-
Surmounting the effects of lossy compression on steganography
-
Baltimore, MD, October
-
D.L. Currie, III and C.E. Irvine: Surmounting the Effects of Lossy Compression on Steganography, In National Information System Security Conference, Baltimore, MD, pp. 194-201, October 1996
-
(1996)
National Information System Security Conference
, pp. 194-201
-
-
Currie D.L. III1
Irvine, C.E.2
-
10
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
March
-
M. van Dijk: On a Special Class of Broadcast Channels with Confidential Messages, IEEE Transactions on Information Theory, V. 43, No. 2, pp. 712-714, March 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.2
, pp. 712-714
-
-
Van Dijk, M.1
-
11
-
-
84957886834
-
Steganalysis and game equilibria
-
D. Aucsmith, editor, Information Hiding: Second International Workshop, Springer-Verlag
-
J.M. Ettinger: Steganalysis and Game Equilibria In D. Aucsmith, editor, Information Hiding: Second International Workshop, vol. 1525 of LNCS, pp. 319-328. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1525
, pp. 319-328
-
-
Ettinger, J.M.1
-
12
-
-
84955584804
-
The history of steganography
-
R. Anderson, editor, Information Hiding: First International Workshop, Springer-Verlag
-
D. Kahn: The History of Steganography In R. Anderson, editor, Information Hiding: First International Workshop, vol. 1174 of LNCS, pp. 1-6, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 1-6
-
-
Kahn, D.1
-
14
-
-
85055811894
-
A cautionary note on image downgrading
-
San Antonio, TX, USA, Dec.
-
C Kurak & J. McHugh: A Cautionary Note on Image Downgrading In Computer Security Applications Conference, San Antonio, TX, USA, pp. 153-159, Dec. 1992.
-
(1992)
Computer Security Applications Conference
, pp. 153-159
-
-
Kurak, C.1
McHugh, J.2
-
16
-
-
84947902426
-
An information-theoretic approach to steganography and watermarking
-
A. Pfitzmann, editor, Information Hiding: Third International Workshop, Springer-Verlag
-
T. Mittelholzer: An Information-Theoretic Approach to Steganography and Watermarking In A. Pfitzmann, editor, Information Hiding: Third International Workshop, vol. 1768 of LNCS, pp. 1-16. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1768
, pp. 1-16
-
-
Mittelholzer, T.1
-
18
-
-
0012085074
-
Information hiding: Third international workshop
-
Springer-Verlag
-
A. Pfitzmann, editor: Information Hiding: Third International Workshop, vol. 1768 of Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1768
-
-
Pfitzmann, A.1
-
19
-
-
84955568589
-
Information hiding terminology
-
R. Anderson, editor, Information Hiding: First International Workshop, Springer-Verlag
-
B. Pfitzmann: Information Hiding Terminology In R. Anderson, editor, Information Hiding: First International Workshop, vol. 1174 of LNCS, pp. 347-350. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 347-350
-
-
Pfitzmann, B.1
-
20
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
R. Anderson, editor, Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, (Blowfish implementation written by Eric Young)
-
B. Schneier: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), In R. Anderson, editor, Fast Software Encryption, Cambridge Security Workshop Proceedings, vol. 809 of LNCS, pp. 191-204. Springer-Verlag, 1994 (Blowfish implementation written by Eric Young).
-
(1994)
LNCS
, vol.809
, pp. 191-204
-
-
Schneier, B.1
-
21
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E Shannon: Communication theory of Secrecy Systems Bell System Technical Journal, Vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
22
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
D. Chaum, editor, Plenum Press
-
G. Simmons: The Prisoners' Problem and the Subliminal Channel In D. Chaum, editor, Advances in Cryptology: Proceedings of Crypto 83, pp. 51-67. Plenum Press, 1984.
-
(1984)
Advances in Cryptology: Proceedings of Crypto
, vol.83
, pp. 51-67
-
-
Simmons, G.1
-
24
-
-
0016562514
-
The wire-tap channel
-
October
-
A.D. Wyner: The Wire-Tap Channel The Bell System Technical Journal, V. 54, No. 8, pp. 1355-1387, October 1975.
-
(1975)
The Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
25
-
-
84957886335
-
Modeling the security of steganographic systems
-
D. Aucsmith, editor, Information Hiding: Second International Workshop, Springer-Verlag
-
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wieke, & G. Wolf: Modeling the Security of Steganographic Systems In D. Aucsmith, editor, Information Hiding: Second International Workshop, vol. 1525 of LNCS, pp. 344-354. Springer-Verlag, 1998
-
(1998)
LNCS
, vol.1525
, pp. 344-354
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wieke, G.7
Wolf, G.8
|