-
1
-
-
33644584958
-
Cryptography of video information in modern communications
-
Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar "Cryptography of Video Information In Modern Communications", Electronics And Energetics, vol. 11, pp. 115-125, 1998.
-
(1998)
Electronics and Energetics
, vol.11
, pp. 115-125
-
-
Hrytskiv, Z.1
Voloshynovskiy, S.2
Rytsar, Y.3
-
2
-
-
71249162142
-
Information - Theoretic analysis of information hiding
-
Boston, MA, October
-
P.Moulin & J.A. O'Sullivan, "Information - Theoretic Analysis of Information Hiding", at IEEE International Symposium on Information Theory, Boston, MA, October, 1999.
-
(1999)
IEEE International Symposium on Information Theory
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
3
-
-
84957868624
-
An information-theoretic model for steganography
-
C. Cachin, "An Information-Theoretic Model for Steganography", in proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, 1998
-
(1998)
Proceeding 2nd Information Hiding Workshop
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
5
-
-
84957728214
-
Staganalysis: The investigation of hiding information
-
N.F. Johnson, S. Jajodia, "Staganalysis: The Investigation of Hiding Information", IEEE, pp. 113-116, 1998.
-
(1998)
IEEE
, pp. 113-116
-
-
Johnson, N.F.1
Jajodia, S.2
-
6
-
-
0035330787
-
Digital steganography: Hiding data within data
-
May-Jun
-
D. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing, pp. 75-80, May-Jun 2001.
-
(2001)
IEEE Internet Computing
, pp. 75-80
-
-
Artz, D.1
-
8
-
-
84861714704
-
Steganography: Hidden menace or hidden saviour
-
10 May
-
R A Isbell, "Steganography: Hidden Menace or Hidden Saviour", Steganography White Paper, 10 May 2002.
-
(2002)
Steganography White Paper
-
-
Isbell, R.A.1
-
10
-
-
4243302256
-
Probabilistic methods for improving information hiding
-
January 31
-
N. Provos, "Probabilistic Methods for Improving Information Hiding", CITI Technical Report 01-1, January 31, 2001.
-
(2001)
CITI Technical Report 01-1
-
-
Provos, N.1
-
11
-
-
0000442741
-
Modeling the security of steganographic systems
-
Portland, April
-
J. Zollner, H. Federrath, H. Klimant, et al., "Modeling the Security of Steganographic Systems", in 2nd Workshop on Information Hiding, Portland, April 1998, pp. 345-355.
-
(1998)
2nd Workshop on Information Hiding
, pp. 345-355
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
-
13
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for Data Hiding", Systems Journal, vol. 35, 1996.
-
(1996)
Systems Journal
, vol.35
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
15
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Portland Oregon, USA, April
-
N.F. Johnson & S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", in Proceeding for the Second Information Hiding Workhop, Portland Oregon, USA, April 1998, pp. 273-289.
-
(1998)
Proceeding for the Second Information Hiding Workhop
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
16
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE, pp. 26-34, 1998.
-
(1998)
IEEE
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
21
-
-
0033906136
-
Data hiding via steganographic image transformation
-
February
-
S. Tanako, K. Tanaka and T. Sugimura, "Data Hiding via Steganographic Image Transformation", IEICE Trans. Fundamentals, vol. E83-A, pp. 311-319, February, 2000
-
(2000)
IEICE Trans. Fundamentals
, vol.E83A
, pp. 311-319
-
-
Tanako, S.1
Tanaka, K.2
Sugimura, T.3
|