-
1
-
-
0001217738
-
The prisoner's problem and the subliminal channel
-
G. J. Simmons, "The prisoner's problem and the subliminal channel," in Proc. of CRYPTO'83, 1984, pp. 51-67.
-
(1984)
Proc. of CRYPTO'83
, pp. 51-67
-
-
Simmons, G.J.1
-
2
-
-
0003617369
-
-
Penguin Books, London, translated by Aubrey de Sélincourt
-
Herodotus, The Histories, Penguin Books, London, 1996, translated by Aubrey de Sélincourt.
-
(1996)
The Histories
-
-
Herodotus1
-
3
-
-
0032070303
-
On the limits of steganography
-
R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE J. of Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, 1998.
-
(1998)
IEEE J. of Selected Areas in Communications
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
4
-
-
84890522850
-
Communications theory of secrecy systems
-
C. E. Shannon, "communications theory of secrecy systems," Bell System technical Journal, vol. 28, pp. 656-715, 1954.
-
(1954)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
84955563192
-
Stretching the limits of steganography
-
Proc. on the First Workshop on Information Hiding
-
R. J. Anderson, "Stretching the limits of steganography," in Proc. on the First Workshop on Information Hiding, 1996, vol. 1174 of Springer Lecture Notes in Computer Science, pp. 39-48.
-
(1996)
Springer Lecture Notes in Computer Science
, vol.1174
, pp. 39-48
-
-
Anderson, R.J.1
-
6
-
-
84957868624
-
An information-theoretic model for steganography
-
Proc. on the Second Workshop on Information Hiding
-
C. Cachin, "An information-theoretic model for steganography," in Proc. on the Second Workshop on Information Hiding, 1998, vol. 1525 of Springer Lecture Notes in Computer Science, pp. 306-318.
-
(1998)
Springer Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
7
-
-
35048819204
-
Model based steganography
-
Int. Workshop on Digital Watermarking, T. Kalker, I. J. Cox, and Y. M. Ro, Eds.
-
P. Sallee, "Model based steganography," in Int. Workshop on Digital Watermarking, T. Kalker, I. J. Cox, and Y. M. Ro, Eds., 2004, vol. 2939 of Springer Lecture Notes in Computer Science, pp. 154-167.
-
(2004)
Springer Lecture Notes in Computer Science
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
8
-
-
0015648934
-
Noiseless coding of correlated information sources
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. on Information Theory, vol. IT-19, no. 4, pp. 471-480, 1973.
-
(1973)
IEEE Trans. on Information Theory
, vol.IT-19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
11
-
-
0032625842
-
Watermarking as communications with side information
-
July
-
I. J. Cox, M. L. Miller, and A. L. McKellips, "Watermarking as communications with side information," Proc. IEEE, vol. 87, pp. 1127-1141, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1127-1141
-
-
Cox, I.J.1
Miller, M.L.2
McKellips, A.L.3
-
12
-
-
0033308186
-
On the duality between distributed source coding and data hiding
-
Pacific Grove, CA, USA, Oct.
-
J. Chou, S. S. Pradhan, and K. Ramchandran, "On the duality between distributed source coding and data hiding," in Proc. Thirty-third Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, Oct. 1999, vol. 2, pp. 1503-1507.
-
(1999)
Proc. Thirty-third Asilomar Conference on Signals, Systems, and Computers
, vol.2
, pp. 1503-1507
-
-
Chou, J.1
Pradhan, S.S.2
Ramchandran, K.3
-
13
-
-
84863688391
-
An information-theoretic approach to the design of robust digital watermarking systems
-
Phoenix, Arizona, USA, March
-
B. Chen and G. W. Wornell, "An information-theoretic approach to the design of robust digital watermarking systems," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, vol. 4, pp. 2061-2064.
-
(1999)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing
, vol.4
, pp. 2061-2064
-
-
Chen, B.1
Wornell, G.W.2
-
14
-
-
0036447872
-
Dirty-paper trellis codes for watermarking
-
Rochester, New York, USA, Sept.
-
M. L. Miller, G. J. Doërr, and I. J. Cox, "Dirty-paper trellis codes for watermarking," in Proc. IEEE Int. Conf. on Image Processing, Rochester, New York, USA, Sept. 2002, vol. 2, pp. 129-132.
-
(2002)
Proc. IEEE Int. Conf. on Image Processing
, vol.2
, pp. 129-132
-
-
Miller, M.L.1
Doërr, G.J.2
Cox, I.J.3
-
15
-
-
2942568431
-
Applying informed coding and embedding to design a robust high-capacity watermark
-
June
-
M. L. Miller, G. J. Doërr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Trans. Image Processing, vol. 13, pp. 792-807, June 2004.
-
(2004)
IEEE Trans. Image Processing
, vol.13
, pp. 792-807
-
-
Miller, M.L.1
Doërr, G.J.2
Cox, I.J.3
-
18
-
-
0020752342
-
Writing on dirty paper
-
May
-
M. Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. 29, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 439-441
-
-
Costa, M.1
-
21
-
-
21244447478
-
Image hiding based on block difference
-
C-K Chan, L. M. Cheng, K-C Leung, and S-L Li, "Image hiding based on block difference," in 8th Int. Conf. on Control, Automation, "Robotics and Vision, 2004.
-
(2004)
8th Int. Conf. on Control, Automation, "Robotics and Vision
-
-
Chan, C.-K.1
Cheng, L.M.2
Leung, K.-C.3
Li, S.-L.4
|