메뉴 건너뛰기




Volumn , Issue , 2010, Pages 213-223

The square root law does not require a linear key

Author keywords

square root law; steganalysis; steganographic capacity; steganography

Indexed keywords

EMBEDDING KEY; EMBEDDING PROCESS; FISHER INFORMATION; HIDDEN PAYLOAD; MATRIX; PAY LOAD CAPACITY; SQUARE ROOTS; STATISTICAL PROPERTIES; STEGANALYSIS; STEGANOGRAPHIC CAPACITY; STEGANOGRAPHIC SECURITY;

EID: 78149262243     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1854229.1854267     Document Type: Conference Paper
Times cited : (15)

References (18)
  • 2
    • 78149245681 scopus 로고    scopus 로고
    • Wet paper codes for public key steganography?
    • Unpublished rump session talk at Available at
    • R. Böhme. Wet paper codes for public key steganography? Unpublished rump session talk at 7th Information Hiding Workshop, Barcelona, Spain, 2005. Available at http://www.inf.tu-dresden.de/~rb21/publications/Boehme2005-IHW- RumpSession.pdf.
    • 7th Information Hiding Workshop, Barcelona, Spain, 2005
    • Böhme, R.1
  • 4
    • 70350445582 scopus 로고    scopus 로고
    • Fisher Information determines capacity of ε-secure steganography
    • Proc. 11th Information Hiding Workshop, Springer
    • T. Filler and J. Fridrich. Fisher Information determines capacity of ε-secure steganography. In Proc. 11th Information Hiding Workshop, volume 5806 of Springer LNCS, pages 31-47, 2009.
    • (2009) LNCS , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 5
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for Markov covers
    • Media Forensics and Security XI
    • T. Filler, A. Ker, and J. Fridrich. The square root law of steganographic capacity for Markov covers. In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0801-0811, 2009.
    • (2009) Proc. SPIE , vol.7254 , pp. 801-811
    • Filler, T.1    Ker, A.2    Fridrich, J.3
  • 6
    • 60449112398 scopus 로고    scopus 로고
    • Asymptotic behavior of the ZZW embedding construction
    • J. Fridrich. Asymptotic behavior of the ZZW embedding construction. IEEE Trans. Information Forensics and Security, 4(1):151-153, 2009.
    • (2009) IEEE Trans. Information Forensics and Security , vol.4 , Issue.1 , pp. 151-153
    • Fridrich, J.1
  • 8
    • 85084686942 scopus 로고    scopus 로고
    • On steganographic embedding efficiency
    • Proc. 10th Information Hiding Workshop, Springer
    • J. Fridrich, P. Lisoněk, and D. Soukal. On steganographic embedding efficiency. In Proc. 10th Information Hiding Workshop, volume 4437 of Springer LNCS, pages 60-71, 2008.
    • (2008) LNCS , vol.4437 , pp. 60-71
    • Fridrich, J.1    Lisoněk, P.2    Soukal, D.3
  • 10
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • A. Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525-528, 2007.
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.1
  • 12
    • 42949178523 scopus 로고    scopus 로고
    • Steganographic strategies for a square distortion function
    • Security, Forensics, Steganography and Watermarking of Multimedia Contents X
    • A. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 0401-0413, 2008.
    • (2008) Proc. SPIE , vol.6819 , pp. 401-413
    • Ker, A.1
  • 13
    • 70350440358 scopus 로고    scopus 로고
    • Estimating Steganographic Fisher Information in real images
    • Proc. 11th Information Hiding Workshop, Springer
    • A. Ker. Estimating Steganographic Fisher Information in real images. In Proc. 11th Information Hiding Workshop, volume 5806 of Springer LNCS, pages 73-88, 2009.
    • (2009) LNCS , vol.5806 , pp. 73-88
    • Ker, A.1
  • 16
    • 67749114807 scopus 로고    scopus 로고
    • Asymptotically optimal perfect steganographic systems
    • B. Ryabko and D. Ryabko. Asymptotically optimal perfect steganographic systems. Problems of Information Transmission, 45(2):184-190, 2009.
    • (2009) Problems of Information Transmission , vol.45 , Issue.2 , pp. 184-190
    • Ryabko, B.1    Ryabko, D.2
  • 17
    • 84937814312 scopus 로고    scopus 로고
    • F5 - A steganographic algorithm: High capacity despite better steganalysis
    • Proc. 4th Information Hiding Workshop, Springer
    • A. Westfeld. F5 - a steganographic algorithm: High capacity despite better steganalysis. In Proc. 4th Information Hiding Workshop, volume 2137 of Springer LNCS, pages 289-302, 2001.
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 18
    • 78149235673 scopus 로고    scopus 로고
    • Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes
    • Proc. 10th Information Hiding Workshop, Springer
    • W. Zhang, Z. Zhang, and S. Wang. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. In Proc. 10th Information Hiding Workshop, volume 4437 of Springer LNCS, pages 282-296, 2008.
    • (2008) LNCS , vol.4437 , pp. 282-296
    • Zhang, W.1    Zhang, Z.2    Wang, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.