-
1
-
-
0001217738
-
The Prisoners' Problem and the subliminal channel
-
Chaum D. New York: Plenum Press
-
Simmons G.J. The Prisoners' Problem and the subliminal channel. Chaum D. Advances in Cryptology: Proceedings of Crypto. 83:1984;51-67 Plenum Press, New York.
-
(1984)
Advances in Cryptology: Proceedings of Crypto
, vol.83
, pp. 51-67
-
-
Simmons, G.J.1
-
4
-
-
84955568589
-
Information hiding terminology
-
Information Hiding, First International Workshop R. Anderson. Berlin: Springer
-
Pfitzmann B. Information hiding terminology. Anderson R. Information Hiding, First International Workshop. Lecture Notes in Computer Science. vol. 1174:1996;347-350 Springer, Berlin.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 347-350
-
-
Pfitzmann, B.1
-
5
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 28:1949;656-715.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
6
-
-
0002561772
-
An information-theoretic approach to steganography and watermarking
-
A. Pfitzmann. Lecture Notes in Computer Science Berlin: Springer
-
Mittelholzer T. An information-theoretic approach to steganography and watermarking. Pfitzmann A. Information Hiding, Third International Workshop, IH'99. vol. 1768, Lecture Notes in Computer Science. 1999;1-16 Springer, Berlin.
-
(1999)
Information Hiding, Third International Workshop, IH'99
, vol.1768
, pp. 1-16
-
-
Mittelholzer, T.1
-
7
-
-
0034228863
-
Authentication theory and hypothesis testing
-
Maurer U. Authentication theory and hypothesis testing. IEEE Trans. Inform. Theory. 46:(4):2000;1350-1356.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.1
-
8
-
-
84926193517
-
Visual cryptography
-
A. De Santis. Lecture Notes in Computer Science Berlin: Springer
-
Naor M., Shamir A. Visual cryptography. De Santis A. Advances in Cryptology: EUROCRYPT '94. vol. 950, Lecture Notes in Computer Science. 1995;1-12 Springer, Berlin.
-
(1995)
Advances in Cryptology: EUROCRYPT '94
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
12
-
-
0032183789
-
The method of types
-
Csiszár I. The method of types. IEEE Trans. Inform. Theory. 44:(6):1998;2505-2523.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.6
, pp. 2505-2523
-
-
Csiszár, I.1
-
14
-
-
84957886834
-
Steganalysis and game equilibria
-
D. Aucsmith. Lecture Notes in Computer Science Berlin: Springer
-
Ettinger M. Steganalysis and game equilibria. Aucsmith D. Information Hiding, Second International Workshop. vol. 1525, Lecture Notes in Computer Science. 1998;319-328 Springer, Berlin.
-
(1998)
Information Hiding, Second International Workshop
, vol.1525
, pp. 319-328
-
-
Ettinger, M.1
-
15
-
-
84957886335
-
Modeling the security of steganographic systems
-
D. Aucsmith. Lecture Notes in Computer Science Berlin: Springer
-
Zöllner J., Federrath H., Klimant H., Pfitzmann A., Piotraschke R., Westfeld A., Wicke G., Wolf G. Modeling the security of steganographic systems. Aucsmith D. Information Hiding, Second International Workshop. vol. 1525, Lecture Notes in Computer Science. 1998;344-354 Springer, Berlin.
-
(1998)
Information Hiding, Second International Workshop
, vol.1525
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
16
-
-
84937438364
-
Provably secure steganography
-
M. Yung. Lecture Notes in Computer Science Berlin: Springer
-
Hopper N.J., Langford J., von Ahn L. Provably secure steganography. Yung M. Advances in Cryptology: CRYPTO 2002. vol. 2442, Lecture Notes in Computer Science. 2002;77-92 Springer, Berlin.
-
(2002)
Advances in Cryptology: CRYPTO 2002
, vol.2442
, pp. 77-92
-
-
Hopper, N.J.1
Langford, J.2
Von Ahn, L.3
|