-
1
-
-
84947940555
-
An Information-Theoretic Model for Steganography, Proceeding of the Second Intern
-
C. Cachin, “An Information-Theoretic Model for Steganography,” Proceeding of the Second Intern. Information Hiding Workshop, Portland, Oregon, USA, April 15-17, 1998. 1
-
(1998)
Information Hiding Workshop, Portland, Oregon, USA, April
, vol.15-17
, pp. 1
-
-
Cachin, C.1
-
2
-
-
84947942803
-
Throwing More Light on Image Watermarks, Proceeding of the Second Intern
-
J.R. Hernandez and F. Perez-Gonzales, “Throwing More Light on Image Watermarks,” Proceeding of the Second Intern. Information Hiding Workshop, Portland, Oregon, USA, April 15-17, 1998. 1
-
(1998)
Information Hiding Workshop, Portland, Oregon, USA
, Issue.1
, pp. 15-17
-
-
Hernandez, J.R.1
Perez-Gonzales, F.2
-
3
-
-
84947909741
-
Modeling the Security of Steganographic Systems, Proceeding of the Second Intern
-
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, “Modeling the Security of Steganographic Systems,” Proceeding of the Second Intern. Information Hiding Workshop, Portland, Oregon, USA, April 15-17, 1998. 1
-
(1998)
Information Hiding Workshop, Portland, Oregon, USA
, Issue.1
, pp. 15-17
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
4
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio and video, IEEE Proc. Int. Conf
-
I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video,” IEEE Proc. Int. Conf. Image Processing, 1996, vol. 3, pp. 243–246. 2, 9
-
(1996)
Image Processing
, vol.3
, Issue.2-9
, pp. 243-246
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
5
-
-
0001217738
-
-
G.J. Simmons, “The Prisoners’ Problem and the Subliminal Channel,” Crypto’83 Proc., Ed. D. Chaum, Plenum Press, New York, 1984, pp. 51–67. 2
-
(1984)
The Prisoners Problem and the Subliminal Channel,” Crypto’83 Proc., Ed. D. Chaum, Plenum Press, New York
, Issue.2
, pp. 51-67
-
-
Simmons, G.J.1
-
8
-
-
17144417018
-
Elements of Information Theory
-
T.M. Cover and J.A. Thomas, Elements of Information Theory, Wiley 1991. 4, 7, 12
-
(1991)
Wiley
, vol.4
, Issue.7
, pp. 12
-
-
Cover, T.M.1
Thomas, J.A.2
-
9
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. Shannon, “Communication Theory of Secrecy Systems,” Bell System Technical Journal, vol. 28, pp. 656–715, 1949. 8
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.8
, pp. 656-715
-
-
Shannon, C.1
-
10
-
-
84892180578
-
Permutation Modulation, Proc. Of the IEEE, Vol
-
D. Slepian, “Permutation Modulation,” Proc. of the IEEE, Vol. 53, No., 3, March 1965, pp. 228–236. 8
-
(1965)
53, No., 3
, vol.8
, pp. 228-236
-
-
Slepian, D.1
-
11
-
-
0016060859
-
Lower Bounds on the Maximum Cross Correlation of Signals
-
L.R. Welch, “Lower Bounds on the Maximum Cross Correlation of Signals,” IEEE Trans. on Information Th., vol. IT-20, May 1974, pp. 397–399. 10
-
(1974)
IEEE Trans. On Information Th., Vol. IT-20
, vol.10
, pp. 397-399
-
-
Welch, L.R.1
-
12
-
-
0032072279
-
-
C.I. Podilchuk, W. Zeng, “Image-Adaptive Watermarking Using Visual Models,” IEEE J. Selected Areas in Communications, vol. 16, No. 4, May 1998, pp. 525–539. 11, 15, 16
-
(1998)
Image-Adaptive Watermarking Using Visual Models, IEEE J. Selected Areas in Communications
, vol.16
, Issue.4
, pp. 525-539
-
-
Podilchuk, C.I.1
Zeng, W.2
|