-
2
-
-
70350562893
-
The Square Root Law of steganographic capacity for Markov covers
-
T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In Proc. SPIE, EI, volume 7254, pages 08 1-08 11, 2009.
-
(2009)
Proc. SPIE, EI
, vol.7254
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
3
-
-
60449112398
-
Asymptotic behavior of the ZZW embedding construction
-
Mar
-
J. Fridrich. Asymptotic behavior of the ZZW embedding construction. IEEE TIFS, 4(1):151-153, Mar. 2009.
-
(2009)
IEEE TIFS
, vol.4
, Issue.1
, pp. 151-153
-
-
Fridrich, J.1
-
4
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
J. Fridrich and T. Filler. Practical methods for minimizing embedding impact in steganography. In Proc. SPIE, EI, volume 6505, pages 02-03, 2007.
-
(2007)
Proc. SPIE, EI
, vol.6505
, pp. 02-03
-
-
Fridrich, J.1
Filler, T.2
-
5
-
-
33746615578
-
Efficient wet paper codes
-
7th Inform. HidingWorksh, IHW, of, Springer-Verlag
-
J. Fridrich, M. Goljan, and D. Soukal. Efficient wet paper codes. In 7th Inform. HidingWorksh. (IHW), volume 3727 of LNCS, pages 204-218. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3727
, pp. 204-218
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
6
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
J. Fridrich, M. Goljan, and D. Soukal. Wet paper codes with improved embedding efficiency. IEEE TIFS, 1(1):102-110, 2006.
-
(2006)
IEEE TIFS
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
7
-
-
21844470700
-
Writing on wet paper
-
Oct
-
J. Fridrich, M. Goljan, D. Soukal, and P. Lisoněk. Writing on wet paper. In IEEE TSP, Special Issue on Media Security, volume 53, pages 3923-3935, Oct. 2005.
-
(2005)
IEEE TSP, Special Issue on Media Security
, vol.53
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Lisoněk, P.4
-
9
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Kodovský, J. Fridrich, and T. Pevný . Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proc. 9th ACM Multim. & Sec. Workshop, pages 3-14, 2007.
-
(2007)
Proc. 9th ACM Multim. & Sec. Workshop
, pp. 3-14
-
-
Kodovský, J.1
Fridrich, J.2
Pevný, T.3
-
10
-
-
33750922236
-
Embedding with syndrome coding based on BCH codes
-
D. Schönfeld and A. Winkler. Embedding with syndrome coding based on BCH codes. In Proc. 8th ACM MmSec. Workshop, pages 214-223, 2006.
-
(2006)
Proc. 8th ACM MmSec. Workshop
, pp. 214-223
-
-
Schönfeld, D.1
Winkler, A.2
-
11
-
-
56749177023
-
Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes
-
10th IHW, of, Springer-Verlag
-
W. Zhang, X. Zhang, and S. Wang. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. In 10th IHW, volume 5284 of LNCS, pg. 60-71. Springer-Verlag, 2008.
-
(2008)
LNCS
, vol.5284
, pp. 60-71
-
-
Zhang, W.1
Zhang, X.2
Wang, S.3
-
12
-
-
34247247816
-
Efficient double-layered steganographic embedding
-
Apr
-
X. Zhang, W. Zhang, and S. Wang. Efficient double-layered steganographic embedding. Electronics Letters, 43:482-483, Apr. 2007.
-
(2007)
Electronics Letters
, vol.43
, pp. 482-483
-
-
Zhang, X.1
Zhang, W.2
Wang, S.3
|