메뉴 건너뛰기




Volumn 3710 LNCS, Issue , 2005, Pages 15-29

Information transmission and steganography

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED SYSTEMS; ENCODING (SYMBOLS); INFORMATION TECHNOLOGY; INFORMATION THEORY; MATHEMATICAL MODELS; SECURITY SYSTEMS;

EID: 33646197092     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11551492_2     Document Type: Conference Paper
Times cited : (30)

References (21)
  • 1
    • 0001217738 scopus 로고
    • The prisoner's problem and the subliminal channel
    • G. J. Simmons, "The prisoner's problem and the subliminal channel," in Proc. of CRYPTO'83, 1984, pp. 51-67.
    • (1984) Proc. of CRYPTO'83 , pp. 51-67
    • Simmons, G.J.1
  • 2
    • 0003617369 scopus 로고    scopus 로고
    • Penguin Books, London, translated by Aubrey de Sélincourt
    • Herodotus, The Histories, Penguin Books, London, 1996, translated by Aubrey de Sélincourt.
    • (1996) The Histories
    • Herodotus1
  • 4
    • 84890522850 scopus 로고
    • Communications theory of secrecy systems
    • C. E. Shannon, "communications theory of secrecy systems," Bell System technical Journal, vol. 28, pp. 656-715, 1954.
    • (1954) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 5
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • Proc. on the First Workshop on Information Hiding
    • R. J. Anderson, "Stretching the limits of steganography," in Proc. on the First Workshop on Information Hiding, 1996, vol. 1174 of Springer Lecture Notes in Computer Science, pp. 39-48.
    • (1996) Springer Lecture Notes in Computer Science , vol.1174 , pp. 39-48
    • Anderson, R.J.1
  • 6
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Proc. on the Second Workshop on Information Hiding
    • C. Cachin, "An information-theoretic model for steganography," in Proc. on the Second Workshop on Information Hiding, 1998, vol. 1525 of Springer Lecture Notes in Computer Science, pp. 306-318.
    • (1998) Springer Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 7
    • 35048819204 scopus 로고    scopus 로고
    • Model based steganography
    • Int. Workshop on Digital Watermarking, T. Kalker, I. J. Cox, and Y. M. Ro, Eds.
    • P. Sallee, "Model based steganography," in Int. Workshop on Digital Watermarking, T. Kalker, I. J. Cox, and Y. M. Ro, Eds., 2004, vol. 2939 of Springer Lecture Notes in Computer Science, pp. 154-167.
    • (2004) Springer Lecture Notes in Computer Science , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 8
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. on Information Theory, vol. IT-19, no. 4, pp. 471-480, 1973.
    • (1973) IEEE Trans. on Information Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 11
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communications with side information
    • July
    • I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, pp. 1127-1141, July 1999.
    • (1999) Proc. IEEE , vol.87 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    McKellips, A.L.3
  • 13
    • 84863688391 scopus 로고    scopus 로고
    • An information-theoretic approach to the design of robust digital watermarking systems
    • Phoenix, Arizona, USA, March
    • B. Chen and G. W. Wornell, "An information-theoretic approach to the design of robust digital watermarking systems," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, vol. 4, pp. 2061-2064.
    • (1999) Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing , vol.4 , pp. 2061-2064
    • Chen, B.1    Wornell, G.W.2
  • 14
    • 0036447872 scopus 로고    scopus 로고
    • Dirty-paper trellis codes for watermarking
    • Rochester, New York, USA, Sept.
    • M. L. Miller, G. J. Doërr, and I. J. Cox, "Dirty-paper trellis codes for watermarking," in Proc. IEEE Int. Conf. on Image Processing, Rochester, New York, USA, Sept. 2002, vol. 2, pp. 129-132.
    • (2002) Proc. IEEE Int. Conf. on Image Processing , vol.2 , pp. 129-132
    • Miller, M.L.1    Doërr, G.J.2    Cox, I.J.3
  • 15
    • 2942568431 scopus 로고    scopus 로고
    • Applying informed coding and embedding to design a robust high-capacity watermark
    • June
    • M. L. Miller, G. J. Doërr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Trans. Image Processing, vol. 13, pp. 792-807, June 2004.
    • (2004) IEEE Trans. Image Processing , vol.13 , pp. 792-807
    • Miller, M.L.1    Doërr, G.J.2    Cox, I.J.3
  • 18
    • 0020752342 scopus 로고
    • Writing on dirty paper
    • May
    • M. Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. 29, pp. 439-441, May 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , pp. 439-441
    • Costa, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.