-
2
-
-
78149245681
-
Wet paper codes for public key steganography?
-
Unpublished rump session talk at Available at
-
R. Böhme. Wet paper codes for public key steganography? Unpublished rump session talk at 7th Information Hiding Workshop, Barcelona, Spain, 2005. Available at http://www.inf.tu-dresden.de/~rb21/publications/Boehme2005-IHW- RumpSession.pdf.
-
7th Information Hiding Workshop, Barcelona, Spain, 2005
-
-
Böhme, R.1
-
4
-
-
70350445582
-
Fisher Information determines capacity of ε-secure steganography
-
Proc. 11th Information Hiding Workshop, Springer
-
T. Filler and J. Fridrich. Fisher Information determines capacity of ε-secure steganography. In Proc. 11th Information Hiding Workshop, volume 5806 of Springer LNCS, pages 31-47, 2009.
-
(2009)
LNCS
, vol.5806
, pp. 31-47
-
-
Filler, T.1
Fridrich, J.2
-
5
-
-
70350562893
-
The square root law of steganographic capacity for Markov covers
-
Media Forensics and Security XI
-
T. Filler, A. Ker, and J. Fridrich. The square root law of steganographic capacity for Markov covers. In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0801-0811, 2009.
-
(2009)
Proc. SPIE
, vol.7254
, pp. 801-811
-
-
Filler, T.1
Ker, A.2
Fridrich, J.3
-
6
-
-
60449112398
-
Asymptotic behavior of the ZZW embedding construction
-
J. Fridrich. Asymptotic behavior of the ZZW embedding construction. IEEE Trans. Information Forensics and Security, 4(1):151-153, 2009.
-
(2009)
IEEE Trans. Information Forensics and Security
, vol.4
, Issue.1
, pp. 151-153
-
-
Fridrich, J.1
-
7
-
-
21844470700
-
Writing on wet paper
-
J. Fridrich, M. Goljan, P. Lisoněk, and D. Soukal. Writing on wet paper. IEEE Trans. Sig. Proc., Special Issue on Media Security, 53:3923-3935, 2005.
-
(2005)
IEEE Trans. Sig. Proc., Special Issue on Media Security
, vol.53
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisoněk, P.3
Soukal, D.4
-
8
-
-
85084686942
-
On steganographic embedding efficiency
-
Proc. 10th Information Hiding Workshop, Springer
-
J. Fridrich, P. Lisoněk, and D. Soukal. On steganographic embedding efficiency. In Proc. 10th Information Hiding Workshop, volume 4437 of Springer LNCS, pages 60-71, 2008.
-
(2008)
LNCS
, vol.4437
, pp. 60-71
-
-
Fridrich, J.1
Lisoněk, P.2
Soukal, D.3
-
10
-
-
34547881527
-
A capacity result for batch steganography
-
A. Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525-528, 2007.
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.1
-
12
-
-
42949178523
-
Steganographic strategies for a square distortion function
-
Security, Forensics, Steganography and Watermarking of Multimedia Contents X
-
A. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 0401-0413, 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 401-413
-
-
Ker, A.1
-
13
-
-
70350440358
-
Estimating Steganographic Fisher Information in real images
-
Proc. 11th Information Hiding Workshop, Springer
-
A. Ker. Estimating Steganographic Fisher Information in real images. In Proc. 11th Information Hiding Workshop, volume 5806 of Springer LNCS, pages 73-88, 2009.
-
(2009)
LNCS
, vol.5806
, pp. 73-88
-
-
Ker, A.1
-
15
-
-
56749160546
-
The square root law of steganographic capacity
-
A. Ker, T. Pevný, J. Kodovský, and J. Fridrich. The square root law of steganographic capacity. In Proc. 10th ACM Workshop on Multimedia and Security, pages 107-116, 2008.
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 107-116
-
-
Ker, A.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
-
16
-
-
67749114807
-
Asymptotically optimal perfect steganographic systems
-
B. Ryabko and D. Ryabko. Asymptotically optimal perfect steganographic systems. Problems of Information Transmission, 45(2):184-190, 2009.
-
(2009)
Problems of Information Transmission
, vol.45
, Issue.2
, pp. 184-190
-
-
Ryabko, B.1
Ryabko, D.2
-
17
-
-
84937814312
-
F5 - A steganographic algorithm: High capacity despite better steganalysis
-
Proc. 4th Information Hiding Workshop, Springer
-
A. Westfeld. F5 - a steganographic algorithm: High capacity despite better steganalysis. In Proc. 4th Information Hiding Workshop, volume 2137 of Springer LNCS, pages 289-302, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
18
-
-
78149235673
-
Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes
-
Proc. 10th Information Hiding Workshop, Springer
-
W. Zhang, Z. Zhang, and S. Wang. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. In Proc. 10th Information Hiding Workshop, volume 4437 of Springer LNCS, pages 282-296, 2008.
-
(2008)
LNCS
, vol.4437
, pp. 282-296
-
-
Zhang, W.1
Zhang, Z.2
Wang, S.3
|