-
1
-
-
0015672289
-
A Note on the Confinement Problem
-
B.W. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Comm. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
4
-
-
3042817554
-
Steganography in Digital Images,
-
PhD dissertation, Cambridge Univ, Selwyn College, May
-
G. Jagpal, "Steganography in Digital Images," PhD dissertation, Cambridge Univ., Selwyn College, May 1995.
-
(1995)
-
-
Jagpal, G.1
-
6
-
-
0000370347
-
Video-Steganography: How to Secretly Embed a Signature in a Picture
-
K. Matsui and K. Tanaka, "Video-Steganography: How to Secretly Embed a Signature in a Picture," Proc. IMA IP Workshop, 1994.
-
(1994)
Proc. IMA IP Workshop
-
-
Matsui, K.1
Tanaka, K.2
-
7
-
-
84957894605
-
Steganography in a Video Conferencing System
-
98, D. Aucsmith, ed, pp
-
A. Westfeld and G. Wolf, "Steganography in a Video Conferencing System," Proc. Second Int'l Workshop Information Hiding (IH '98), D. Aucsmith, ed., pp. 32-47, 1998.
-
(1998)
Proc. Second Int'l Workshop Information Hiding (IH
, pp. 32-47
-
-
Westfeld, A.1
Wolf, G.2
-
8
-
-
0000073579
-
Echo Hiding
-
96, R.J. Anderson, ed, pp
-
D. Gruhl, A. Lu, and W. Bender, "Echo Hiding," Proc. First Int'l Workshop Information Hiding (IH '96), R.J. Anderson, ed., pp. 293-315, 1996.
-
(1996)
Proc. First Int'l Workshop Information Hiding (IH
, pp. 293-315
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
9
-
-
84957883937
-
Continuous Steganographic Data Transmission Using Uncompressed Audio
-
C. Neubauer, J. Herre, and K. Brandenburg, "Continuous Steganographic Data Transmission Using Uncompressed Audio," Proc. Second Int'l Workshop Information Hiding (IH '98), vol. 1525, pp. 208-217, 1998.
-
(1998)
Proc. Second Int'l Workshop Information Hiding (IH '98)
, vol.1525
, pp. 208-217
-
-
Neubauer, C.1
Herre, J.2
Brandenburg, K.3
-
10
-
-
0029394108
-
Electronic Marking and Identification Techniques to Discourage Document Copying
-
J. Brassil, S.H. Low, N.F. Maxemchuk, and L. O'Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying," IEEE J. Selected Areas in Comm., vol. 13, no. 8, pp. 1495-1504, 1995.
-
(1995)
IEEE J. Selected Areas in Comm
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.1
Low, S.H.2
Maxemchuk, N.F.3
O'Gorman, L.4
-
11
-
-
0001217738
-
The Prisoners' Problem and the Subliminal Channel
-
83, pp
-
G.J. Simmons, "The Prisoners' Problem and the Subliminal Channel," Proc. Int'l Cryptology Conf. (CRYPTO '83), pp. 51-67, 1983.
-
(1983)
Proc. Int'l Cryptology Conf. (CRYPTO
, pp. 51-67
-
-
Simmons, G.J.1
-
13
-
-
0032070303
-
On the Limits of Steganography
-
May
-
R.J. Anderson and F.A. Petitcolas, "On the Limits of Steganography," IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 474-481, May 1998.
-
(1998)
IEEE J. Selected Areas in Comm
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.2
-
15
-
-
0002561772
-
An Information-Theoretic Approach to Steganography and Watermarking
-
99, A. Pfitzmann, ed, pp
-
T. Mittelholzer, "An Information-Theoretic Approach to Steganography and Watermarking," Proc. Third Int'l Workshop Information Hiding (IH '99), A. Pfitzmann, ed., pp. 1-16, 1999.
-
(1999)
Proc. Third Int'l Workshop Information Hiding (IH
, pp. 1-16
-
-
Mittelholzer, T.1
-
16
-
-
84890380431
-
Information Theoretic Analysis of Steganography
-
98, p, Aug
-
J.A. O'Sullivan, P. Moulin, and J.M. Ettinger, "Information Theoretic Analysis of Steganography," Proc. IEEE Int'l Symp. Information Theory (ISIT '98), p. 297, Aug. 1998.
-
(1998)
Proc. IEEE Int'l Symp. Information Theory (ISIT
, pp. 297
-
-
O'Sullivan, J.A.1
Moulin, P.2
Ettinger, J.M.3
-
17
-
-
84957886335
-
Modeling the Security of Steganographic Systems
-
98, pp
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," Proc. Second Int'l Workshop Information Hiding (IH '98), pp. 344-354, 1998.
-
(1998)
Proc. Second Int'l Workshop Information Hiding (IH
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
18
-
-
3042519430
-
An Information-Theoretic Model for Steganography
-
C. Cachin, "An Information-Theoretic Model for Steganography," Information and Computation, vol. 192, no. 1, pp. 41-56, 2004.
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
19
-
-
84937438364
-
Provably Secure Steganography
-
M. Yung, ed, pp
-
N.J. Hopper, J. Langford, and L. von Ahn, "Provably Secure Steganography," Proc. 22nd Ann. Int'l Cryptology Conf. (CRYPTO '02), M. Yung, ed., pp. 77-92, 2002.
-
(2002)
Proc. 22nd Ann. Int'l Cryptology Conf. (CRYPTO '02)
, pp. 77-92
-
-
Hopper, N.J.1
Langford, J.2
von Ahn, L.3
-
20
-
-
24144472815
-
Toward a Theory of Steganography,
-
PhD dissertation, Technical Report CMU-CS-04-157, Carnegie Mellon Univ, Pittsburgh, Aug
-
N. Hopper, "Toward a Theory of Steganography," PhD dissertation, Technical Report CMU-CS-04-157, Carnegie Mellon Univ., Pittsburgh, Aug. 2004.
-
(2004)
-
-
Hopper, N.1
-
21
-
-
33745868393
-
Simple Stateless Steganography
-
Cryptology ePrint Archive, Report 2003/093
-
L. Reyzin and S. Russell, "Simple Stateless Steganography," Cryptology ePrint Archive, Report 2003/093, http://eprint.iacr.org/, 2003.
-
(2003)
-
-
Reyzin, L.1
Russell, S.2
-
22
-
-
24144449819
-
Upper and Lower Bounds on Black-Box Steganography
-
J. Kilian, ed, pp
-
N. Dedić, G. Itkis, L. Reyzin, and S. Russell, "Upper and Lower Bounds on Black-Box Steganography," Proc. Second Theory of Cryptography Conf. (TCC '05), J. Kilian, ed., pp. 227-244, 2005.
-
(2005)
Proc. Second Theory of Cryptography Conf. (TCC '05)
, pp. 227-244
-
-
Dedić, N.1
Itkis, G.2
Reyzin, L.3
Russell, S.4
-
23
-
-
45249089627
-
Efficient Public Key Steganography Secure against Adaptively Chosen Stegotext Attacks
-
Cryptology ePrint Archive, Report 2003/244
-
T.V. Le and K. Kurosawa, "Efficient Public Key Steganography Secure against Adaptively Chosen Stegotext Attacks," Cryptology ePrint Archive, Report 2003/244, http://eprint.iacr.org/, 2003.
-
(2003)
-
-
Le, T.V.1
Kurosawa, K.2
-
24
-
-
33745827681
-
Provably Secure Steganography with Imperfect Sampling
-
M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, eds, pp
-
A. Lysyanskaya and M. Meyerovich, "Provably Secure Steganography with Imperfect Sampling," Proc. Ninth Int'l Conf. Theory and Practice of Public-Key Cryptography (PKC '06), M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, eds., pp. 123-139, 2006.
-
(2006)
Proc. Ninth Int'l Conf. Theory and Practice of Public-Key Cryptography (PKC '06)
, pp. 123-139
-
-
Lysyanskaya, A.1
Meyerovich, M.2
-
25
-
-
24144456920
-
Public-Key Steganography with Active Attacks
-
J. Kilian, ed, pp
-
M. Backes and C. Cachin, "Public-Key Steganography with Active Attacks," Proc. Second Theory of Cryptography Conf. (TCC '05), J. Kilian, ed., pp. 210-226, 2005.
-
(2005)
Proc. Second Theory of Cryptography Conf. (TCC '05)
, pp. 210-226
-
-
Backes, M.1
Cachin, C.2
-
26
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," J. ACM, vol. 33, no. 4, pp. 792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
27
-
-
0345253860
-
A Pseudorandom Generator from Any One-Way Function
-
J. Haåstad, R. Impagliazzo, L.A. Levin, and M. Luby, "A Pseudorandom Generator from Any One-Way Function," SIAM J. Computing, vol. 28, no. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM J. Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Haåstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
|