-
1
-
-
33645695834
-
-
[Online]. Available
-
R. Crandall, "Some notes on steganography," [Online]. Available: http://os.inf.tu dresden. de/.westfeld/crandall.pdf, 1998.
-
(1998)
Some Notes on Steganography
-
-
Crandall, R.1
-
2
-
-
84937814312
-
F5 - A steganographic algorithm
-
Proc. 4th Int. Workshop on Information Hiding, Springer
-
A. Westfeld, "F5 - A steganographic algorithm," in Proc. 4th Int. Workshop on Information Hiding, 2001, vol. 2137 of Springer LNCS, pp. 289-302.
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
3
-
-
38049181797
-
On steganographic embedding efficiency
-
Proc. 8th Int. Workshop on Information Hiding, Springer
-
J. Fridrich, P. Lisoňek, and D. Soukal, "On steganographic embedding efficiency," in Proc. 8th Int. Workshop on Information Hiding, 2006, vol. 4437 of Springer LNCS, pp. 282-296.
-
(2006)
LNCS
, vol.4437
, pp. 282-296
-
-
Fridrich, J.1
Lisoňek, P.2
Soukal, D.3
-
4
-
-
33748096430
-
Matrix embedding for large payloads
-
Sep.
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390-394, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 390-394
-
-
Fridrich, J.1
Soukal, D.2
-
5
-
-
45449087266
-
Constructing good covering codes for applications in steganography
-
Trans. Data Hiding Multimedia Security
-
J. Bierbrauer and J. Fridrich, "Constructing good covering codes for applications in steganography," LNCS Trans. Data Hiding Multimedia Security, vol. 4902, pp. 1-22, 2008.
-
(2008)
LNCS
, vol.4902
, pp. 1-22
-
-
Bierbrauer, J.1
Fridrich, J.2
-
7
-
-
33847156891
-
Steganography and error-correcting codes
-
C. Munuera, "Steganography and error-correcting codes," Signal Process., vol. 87, pp. 1528-1533, 2007.
-
(2007)
Signal Process.
, vol.87
, pp. 1528-1533
-
-
Munuera, C.1
-
8
-
-
77951952912
-
Improving embedding efficiency via matrix embeddig: A case study
-
Yunkai Gao, Xiaolong Li, Tieyong Zeng and Bin Yang. "Improving embedding efficiency via matrix embeddig: a case study". In Proc. ICIP2009, pp:109-112, 2009.
-
(2009)
Proc. ICIP2009
, pp. 109-112
-
-
Gao, Y.1
Li, X.2
Zeng, T.3
Yang, B.4
-
9
-
-
70449596020
-
Constructing specific matrix for efficient matrix embedding
-
Yunkai Gao, Xiaolong Li and Bin Yang. "Constructing specific matrix for efficient matrix embedding". In Proc. ICME2009, pp:1006-1009, 2009.
-
(2009)
Proc. ICME2009
, pp. 1006-1009
-
-
Gao, Y.1
Li, X.2
Yang, B.3
-
11
-
-
14844321910
-
Perturbed quantization steganography using wet paper codes
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography using wet paper codes," in Proc. ACM Multimedia and Security Workshop on Multimedia and Security, 2004, pp. 4-15.
-
(2004)
Proc. ACM Multimedia and Security Workshop on Multimedia and Security
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
12
-
-
21844470700
-
Writing on wet paper
-
J. Fridrich, M. Goljan, P. Lisonek and D. Soukal, "Writing on wet paper," IEEE Trans. Signal Process., vol. 53, pp. 3923-3935, 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
13
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Trans. Inform. Forensics Secur., vol. 1, no. 1, pp. 102-110, 2006.
-
(2006)
IEEE Trans. Inform. Forensics Secur.
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
14
-
-
33746615578
-
Efficient wet paper codes
-
Proc. 7th Int. Workshop on Information Hiding
-
J. Fridrich, M. Goljan, and D. Soukal, "Efficient wet paper codes," in Proc. 7th Int. Workshop on Information Hiding, LNCS 3727, pp. 204-218, 2005.
-
(2005)
LNCS
, vol.3727
, pp. 204-218
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
17
-
-
0034387168
-
On the Rank of Random Matrices
-
C. Cooper, "On the Rank of Random Matrices", Random Structures and Algorithms 16(2), pp. 209-232, 2000.
-
(2000)
Random Structures and Algorithms
, vol.16
, Issue.2
, pp. 209-232
-
-
Cooper, C.1
-
18
-
-
69749111992
-
Generalization of the ZZW embedding construction for steganography
-
Sep.
-
W. Zhang and X. Wang, "Generalization of the ZZW embedding construction for steganography", IEEE Trans. Inf. Forensics Security correspondence, vo4, no. 3, pp. 564-569, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security Correspondence
, vol.4
, Issue.3
, pp. 564-569
-
-
Zhang, W.1
Wang, X.2
|