-
2
-
-
84957868624
-
An Information-Theoretic Model for Steganography
-
Aucsmith, D. (ed.) IH 1998. Springer, Heidelberg
-
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306-318. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
3
-
-
12244295760
-
Adversarial classification
-
ACM, New York
-
Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial classification. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99-108. ACM, New York (2004)
-
(2004)
Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
4
-
-
77951871502
-
Minimizing Embedding Impact in Steganography Using Trellis-coded Quantization
-
Memon, N.D., Dittmann, J., Alattar, A.M., Delp, E.J. (eds.) Media Forensics and Security. SPIE
-
Filler, T., Judas, J., Fridrich, J.J.: Minimizing Embedding Impact in Steganography Using Trellis-coded Quantization. In: Memon, N.D., Dittmann, J., Alattar, A.M., Delp, E.J. (eds.) Media Forensics and Security. SPIE Proceedings, vol. 7541, p. 754105. SPIE (2010)
-
(2010)
SPIE Proceedings
, vol.7541
, pp. 754105
-
-
Filler, T.1
Judas, J.2
Fridrich, J.J.3
-
5
-
-
33750906998
-
Minimizing the Embedding Impact in Steganography
-
ACM
-
Fridrich, J.: Minimizing the Embedding Impact in Steganography. In: Workshop on Multimedia and Security, pp. 2-10. ACM (2006)
-
(2006)
Workshop on Multimedia and Security
, pp. 2-10
-
-
Fridrich, J.1
-
6
-
-
84937438364
-
Provably Secure Steganography
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77-92. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 77-92
-
-
Hopper, N.J.1
Langford, J.2
Von Ahn, L.3
-
7
-
-
0036030621
-
Defining Security in Steganographic Systems
-
Delp, E.J., Wong, P.W. (eds.) San Jose, CA
-
Katzenbeisser, S., Petitcolas, F.A.P.: Defining Security in Steganographic Systems. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents IV, San Jose, CA, vol. 4675, pp. 50-56 (2002)
-
(2002)
Security, Steganography and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 50-56
-
-
Katzenbeisser, S.1
Petitcolas, F.A.P.2
-
8
-
-
78549231321
-
The Square Root Law in Stegosystems with Imperfect Information
-
Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. Springer, Heidelberg
-
Ker, A.D.: The Square Root Law in Stegosystems with Imperfect Information. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 145-160. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6387
, pp. 145-160
-
-
Ker, A.D.1
-
9
-
-
56749160546
-
The Square Root Law of Steganographic Capacity
-
ACM, New York
-
Ker, A.D., Pevńy, T., Kodovský, J., Fridrich, J.: The Square Root Law of Steganographic Capacity. In: MM&Sec 2008: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 107-116. ACM, New York (2008)
-
(2008)
MM&Sec 2008: Proceedings of the 10th ACM Workshop on Multimedia and Security
, pp. 107-116
-
-
Ker, A.D.1
Pevńy, T.2
Kodovský, J.3
Fridrich, J.4
-
10
-
-
78549231320
-
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography
-
Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. Springer, Heidelberg
-
Pevný, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161-177. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
11
-
-
84870632579
-
A Game-Theoretic Approach to Content-Adaptive Steganography
-
Ghosal, D., Kirchner, M. (eds.) Information Hiding. Springer to appear
-
Schöttle, P., Böhme, R.: A Game-Theoretic Approach to Content-Adaptive Steganography. In: Ghosal, D., Kirchner, M. (eds.) Information Hiding. LNCS, Springer (to appear, 2012)
-
(2012)
LNCS
-
-
Schöttle, P.1
Böhme, R.2
-
12
-
-
45249103920
-
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
-
Wang, Y., Moulin, P.: Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions. IEEE Transactions on Information Theory 54(6), 2706-2722 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
|