-
2
-
-
77951773086
-
-
1st ed. New York, NY, USA: Cambridge University Press
-
J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 1st ed. New York, NY, USA: Cambridge University Press, 2009.
-
(2009)
Steganography in Digital Media: Principles, Algorithms, and Applications
-
-
Fridrich, J.1
-
3
-
-
0004116989
-
-
2nd Ed. Cambridge Massachusetts: MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. Cambridge, Massachusetts: MIT Press, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
4
-
-
84890522850
-
Communication theory of security
-
C. E. Shannon, "Communication theory of security," Bell System Technical J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
84944878354
-
-
1st ed. Boca Raton, FL, USA: CRC Press, Inc
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL, USA: CRC Press, Inc., 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
8
-
-
3042519430
-
An information-theoretic model for steganography
-
C. Cachin, "An information-theoretic model for steganography," Information and Computation, vol. 192, no. 1, pp. 41-56, 2004.
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
9
-
-
0003462953
-
-
NewYork: John Wiley & Sons, Inc
-
H. L. Van Trees, Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory. NewYork: John Wiley & Sons, Inc., 2001.
-
(2001)
Detection Estimation Modulation Theory, Part I: Detection Estimation and Linear Modulation Theory
-
-
Van Trees, H.L.1
-
10
-
-
0004137446
-
-
2nd Ed. New York NY: Springer Verlag
-
S. Lang, Undergraduate Analysis, 2nd ed. New York, NY: Springer-Verlag, 1997.
-
(1997)
Undergraduate Analysis
-
-
Lang, S.1
-
13
-
-
3042753402
-
New exponential bounds and approximations for the computation of error probability in fading channels
-
Jul
-
M. Chiani, D. Dardari, and M. K. Simon, "New exponential bounds and approximations for the computation of error probability in fading channels," IEEE Transactions on Wireless Communications, vol. 2, no. 4, pp. 840-845, Jul. 2003.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.4
, pp. 840-845
-
-
Chiani, M.1
Dardari, D.2
Simon, M.K.3
-
14
-
-
84883400542
-
-
University of Massachusetts, Tech. Rep. UM-CS-2012-2013
-
B. A. Bash, D. Goeckel, and D. Towsley, "Limits of reliable communication with low probability of detection on AWGN channels," University of Massachusetts, Tech. Rep. UM-CS-2012-003, 2012.
-
(2012)
Limits of Reliable Communication with Low Probability of Detection on AWGN Channels
-
-
Bash, B.A.1
Goeckel, D.2
Towsley, D.3
-
15
-
-
0036713329
-
Random codes: Minimum distances and error exponents
-
Sep
-
A. Barg and G. D. Forney, Jr., "Random codes: minimum distances and error exponents," IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2568-2573, Sep. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.9
, pp. 2568-2573
-
-
Barg, A.1
Forney Jr., G.D.2
-
17
-
-
34547881527
-
A capacity result for batch steganography
-
Aug
-
A. D. Ker, "A capacity result for batch steganography," IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, Aug. 2007.
-
(2007)
IEEE Signal Process. Lett
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
18
-
-
70350562893
-
The square root law of steganographic capacity for markov covers
-
T. Filler, A. D. Ker, and J. Fridrich, "The square root law of steganographic capacity for markov covers," Media Forensics and Security, vol. 7254, no. 1, 2009.
-
(2009)
Media Forensics and Security
, vol.7254
, Issue.1
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
19
-
-
70449629684
-
The square root law requires a linear key
-
New York, NY, USA: ACM
-
A. D. Ker, "The square root law requires a linear key," in Proc. 11th ACM workshop on Multimedia and security, ser. MM&Sec '09. New York, NY, USA: ACM, 2009, pp. 85-92.
-
(2009)
Proc. 11th ACM Workshop on Multimedia and Security, Ser. MM&Sec '09
, pp. 85-92
-
-
Ker, A.D.1
-
20
-
-
78149262243
-
The square root law does not require a linear key
-
New York, NY, USA: ACM
-
"The square root law does not require a linear key," in Proceedings of the 12th ACM workshop on Multimedia and security, ser. MM&Sec '10. New York, NY, USA: ACM, 2010, pp. 213-224.
-
(2010)
Proceedings of the 12th ACM Workshop on Multimedia and Security, Ser. MM&Sec '10
, pp. 213-224
-
-
-
21
-
-
70350445582
-
Fisher information determines capacity of -secure steganography
-
S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg
-
T. Filler and J. Fridrich, "Fisher information determines capacity of -secure steganography," in Information Hiding, ser. Lecture Notes in Computer Science, S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg, 2009, vol. 5806, pp. 31-47.
-
(2009)
Information Hiding, Ser. Lecture Notes in Computer Science
, vol.5806
, pp. 31-47
-
-
Filler, T.1
Fridrich, J.2
-
22
-
-
70350440358
-
Estimating steganographic fisher information in real images
-
S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg
-
A. D. Ker, "Estimating steganographic fisher information in real images," in Information Hiding, ser. Lecture Notes in Computer Science, S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg, 2009, vol. 5806, pp. 73-88.
-
(2009)
Information Hiding, Ser. Lecture Notes in Computer Science
, vol.5806
, pp. 73-88
-
-
Ker, A.D.1
-
24
-
-
0017996501
-
The gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. Hellman, "The gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
25
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
28
-
-
84873934451
-
The embedding capacity of information flows under renewal traffic
-
S. Marano, V. Matta, T. He, and L. Tong, "The embedding capacity of information flows under renewal traffic," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1724-1739, 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.3
, pp. 1724-1739
-
-
Marano, S.1
Matta, V.2
He, T.3
Tong, L.4
-
29
-
-
70349185618
-
A survey of spectrum sensing algorithms for cognitive radio applications
-
First Qtr
-
T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys & Tutorials, vol. 11, no. 1, pp. 116-130, First Qtr 2009.
-
(2009)
IEEE Commun. Surveys & Tutorials
, vol.11
, Issue.1
, pp. 116-130
-
-
Yucek, T.1
Arslan, H.2
-
30
-
-
84883441220
-
Coexistence, connectivity and delay in heterogeneous networks
-
W. Ren, A. Swami, and Q. Zhao, "Coexistence, connectivity and delay in heterogeneous networks," in Proc. 27th Army Science Conference, 2011.
-
(2011)
Proc. 27th Army Science Conference
-
-
Ren, W.1
Swami, A.2
Zhao, Q.3
|