메뉴 건너뛰기




Volumn 192, Issue 1, 2004, Pages 41-56

An information-theoretic model for steganography

Author keywords

Covert channel; Information hiding; One time pad; Perfect security; Subliminal channel; Universal data compression

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; CRYPTOGRAPHY; ENTROPY; MATHEMATICAL MODELS; PROBABILITY DISTRIBUTIONS; PROBLEM SOLVING;

EID: 3042519430     PISSN: 08905401     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ic.2004.02.003     Document Type: Article
Times cited : (265)

References (17)
  • 1
    • 0001217738 scopus 로고
    • The Prisoners' Problem and the subliminal channel
    • Chaum D. New York: Plenum Press
    • Simmons G.J. The Prisoners' Problem and the subliminal channel. Chaum D. Advances in Cryptology: Proceedings of Crypto. 83:1984;51-67 Plenum Press, New York.
    • (1984) Advances in Cryptology: Proceedings of Crypto , vol.83 , pp. 51-67
    • Simmons, G.J.1
  • 4
    • 84955568589 scopus 로고    scopus 로고
    • Information hiding terminology
    • Information Hiding, First International Workshop R. Anderson. Berlin: Springer
    • Pfitzmann B. Information hiding terminology. Anderson R. Information Hiding, First International Workshop. Lecture Notes in Computer Science. vol. 1174:1996;347-350 Springer, Berlin.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 347-350
    • Pfitzmann, B.1
  • 5
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 28:1949;656-715.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 0002561772 scopus 로고    scopus 로고
    • An information-theoretic approach to steganography and watermarking
    • A. Pfitzmann. Lecture Notes in Computer Science Berlin: Springer
    • Mittelholzer T. An information-theoretic approach to steganography and watermarking. Pfitzmann A. Information Hiding, Third International Workshop, IH'99. vol. 1768, Lecture Notes in Computer Science. 1999;1-16 Springer, Berlin.
    • (1999) Information Hiding, Third International Workshop, IH'99 , vol.1768 , pp. 1-16
    • Mittelholzer, T.1
  • 7
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • Maurer U. Authentication theory and hypothesis testing. IEEE Trans. Inform. Theory. 46:(4):2000;1350-1356.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.1
  • 8
    • 84926193517 scopus 로고
    • Visual cryptography
    • A. De Santis. Lecture Notes in Computer Science Berlin: Springer
    • Naor M., Shamir A. Visual cryptography. De Santis A. Advances in Cryptology: EUROCRYPT '94. vol. 950, Lecture Notes in Computer Science. 1995;1-12 Springer, Berlin.
    • (1995) Advances in Cryptology: EUROCRYPT '94 , vol.950 , pp. 1-12
    • Naor, M.1    Shamir, A.2
  • 12
    • 0032183789 scopus 로고    scopus 로고
    • The method of types
    • Csiszár I. The method of types. IEEE Trans. Inform. Theory. 44:(6):1998;2505-2523.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.6 , pp. 2505-2523
    • Csiszár, I.1
  • 14
    • 84957886834 scopus 로고    scopus 로고
    • Steganalysis and game equilibria
    • D. Aucsmith. Lecture Notes in Computer Science Berlin: Springer
    • Ettinger M. Steganalysis and game equilibria. Aucsmith D. Information Hiding, Second International Workshop. vol. 1525, Lecture Notes in Computer Science. 1998;319-328 Springer, Berlin.
    • (1998) Information Hiding, Second International Workshop , vol.1525 , pp. 319-328
    • Ettinger, M.1
  • 16
    • 84937438364 scopus 로고    scopus 로고
    • Provably secure steganography
    • M. Yung. Lecture Notes in Computer Science Berlin: Springer
    • Hopper N.J., Langford J., von Ahn L. Provably secure steganography. Yung M. Advances in Cryptology: CRYPTO 2002. vol. 2442, Lecture Notes in Computer Science. 2002;77-92 Springer, Berlin.
    • (2002) Advances in Cryptology: CRYPTO 2002 , vol.2442 , pp. 77-92
    • Hopper, N.J.1    Langford, J.2    Von Ahn, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.