메뉴 건너뛰기




Volumn , Issue , 2009, Pages 85-91

The square root law requires a linear key

Author keywords

Square root law; Steganalysis; Steganographic capacity; Steganography

Indexed keywords

NONUNIFORM; SECRET KEY; SQUARE ROOTS; STEGANALYSIS; STEGANOGRAPHIC CAPACITY; STEGANOGRAPHY;

EID: 70449629684     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1597817.1597832     Document Type: Conference Paper
Times cited : (17)

References (16)
  • 1
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • C. Cachin. An information-theoretic model for steganography. Information and Computation, 192(1):41-56, 2004.
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 5
    • 70350559581 scopus 로고    scopus 로고
    • Fisher Information determines capacity of ε-secure steganography
    • To appear in
    • T. Filler and J. Fridrich. Fisher Information determines capacity of ε-secure steganography. To appear in Proc. 11th Information Hiding Workshop, 2009.
    • (2009) Proc. 11th Information Hiding Workshop
    • Filler, T.1    Fridrich, J.2
  • 6
    • 70350562893 scopus 로고    scopus 로고
    • T. Filler, A. Ker, and J. Fridrich. The square root law of steganographic capacity for Markov covers. In Media Forensics and Security XI, 7254 of Proc. SPIE, pages 0801-0811, 2009.
    • T. Filler, A. Ker, and J. Fridrich. The square root law of steganographic capacity for Markov covers. In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0801-0811, 2009.
  • 9
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • W. Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301):13-30, 1963.
    • (1963) Journal of the American Statistical Association , vol.58 , Issue.301 , pp. 13-30
    • Hoeffding, W.1
  • 10
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • Proc. 8th Information Hiding Workshop, of
    • A. Ker. Batch steganography and pooled steganalysis. In Proc. 8th Information Hiding Workshop, volume 4437 of Springer LNCS, pages 265-281, 2006.
    • (2006) Springer LNCS , vol.4437 , pp. 265-281
    • Ker, A.1
  • 11
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • A. Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525-528, 2007.
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.1
  • 13
    • 42949178523 scopus 로고    scopus 로고
    • A. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography and Watermarking of Multimedia Contents X, 6819 of Proc. SPIE, pages 0401-0413, 2008.
    • A. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 0401-0413, 2008.
  • 14
    • 78549238017 scopus 로고    scopus 로고
    • Estimating Steganographic Fisher Information in real images
    • To appear in
    • A. Ker. Estimating Steganographic Fisher Information in real images. To appear in Proc. 11th Information Hiding Workshop, 2009.
    • (2009) Proc. 11th Information Hiding Workshop
    • Ker, A.1
  • 15
    • 70350499655 scopus 로고    scopus 로고
    • A. Ker and I. Lubenko. Feature reduction and payload location with WAM steganalysis. In Media Forensics and Security XI, 7254 of Proc. SPIE, pages 0A01-0A13, 2009.
    • A. Ker and I. Lubenko. Feature reduction and payload location with WAM steganalysis. In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0A01-0A13, 2009.
  • 16
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.