|
Volumn , Issue , 1998, Pages 297-
|
Information theoretic analysis of steganography
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ATTACK STRATEGIES;
COMPRESSION STRATEGIES;
CONDITIONAL MUTUAL INFORMATION;
INFORMATION HIDER;
INFORMATION HIDING;
INFORMATION-THEORETIC ANALYSIS;
INPUT AND OUTPUTS;
OPTIMAL CHANNELS;
DATA COMPRESSION;
OPTIMIZATION;
STEGANOGRAPHY;
INFORMATION THEORY;
|
EID: 84890380431
PISSN: 21578095
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ISIT.1998.708902 Document Type: Conference Paper |
Times cited : (69)
|
References (0)
|