-
1
-
-
3042519430
-
An information-theoretic model for steganography
-
C. Cachin. An information-theoretic model for steganography. Information and Computation, 192(1):41-56, 2004.
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
5
-
-
70350559581
-
Fisher Information determines capacity of ε-secure steganography
-
To appear in
-
T. Filler and J. Fridrich. Fisher Information determines capacity of ε-secure steganography. To appear in Proc. 11th Information Hiding Workshop, 2009.
-
(2009)
Proc. 11th Information Hiding Workshop
-
-
Filler, T.1
Fridrich, J.2
-
6
-
-
70350562893
-
-
T. Filler, A. Ker, and J. Fridrich. The square root law of steganographic capacity for Markov covers. In Media Forensics and Security XI, 7254 of Proc. SPIE, pages 0801-0811, 2009.
-
T. Filler, A. Ker, and J. Fridrich. The square root law of steganographic capacity for Markov covers. In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0801-0811, 2009.
-
-
-
-
7
-
-
8844265283
-
Searching for the stego key
-
J. Fridrich, M. Goljan, and D. Soukal. Searching for the stego key. In Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proc. SPIE, pages 70-82, 2004.
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proc. SPIE
, pp. 70-82
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
9
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301):13-30, 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
10
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
Proc. 8th Information Hiding Workshop, of
-
A. Ker. Batch steganography and pooled steganalysis. In Proc. 8th Information Hiding Workshop, volume 4437 of Springer LNCS, pages 265-281, 2006.
-
(2006)
Springer LNCS
, vol.4437
, pp. 265-281
-
-
Ker, A.1
-
11
-
-
34547881527
-
A capacity result for batch steganography
-
A. Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525-528, 2007.
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.1
-
13
-
-
42949178523
-
-
A. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography and Watermarking of Multimedia Contents X, 6819 of Proc. SPIE, pages 0401-0413, 2008.
-
A. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 0401-0413, 2008.
-
-
-
-
14
-
-
78549238017
-
Estimating Steganographic Fisher Information in real images
-
To appear in
-
A. Ker. Estimating Steganographic Fisher Information in real images. To appear in Proc. 11th Information Hiding Workshop, 2009.
-
(2009)
Proc. 11th Information Hiding Workshop
-
-
Ker, A.1
-
15
-
-
70350499655
-
-
A. Ker and I. Lubenko. Feature reduction and payload location with WAM steganalysis. In Media Forensics and Security XI, 7254 of Proc. SPIE, pages 0A01-0A13, 2009.
-
A. Ker and I. Lubenko. Feature reduction and payload location with WAM steganalysis. In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0A01-0A13, 2009.
-
-
-
-
16
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
|