메뉴 건너뛰기




Volumn 1525, Issue , 1998, Pages 306-318

An information-theoretic model for steganography

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84957868624     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49380-8_21     Document Type: Conference Paper
Times cited : (512)

References (24)
  • 6
    • 0003453466 scopus 로고
    • Principles and Practice of Information Theory
    • R. E. Blahut, Principles and Practice of Information Theory. Reading: Addison-Wesley, 1987.
    • (1987) Reading: Addison-Wesley
    • Blahut, R.E.1
  • 8
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia", in Information Hiding
    • (R. Anderson, ed.)of, Springer
    • I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia", in Information Hiding (R. Anderson, ed.), vol. 1174 of Lecture Notes in Computer Science, Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 9
    • 0023168253 scopus 로고
    • Interval and recency rank source coding: Two on-line adaptive variable-length schemes
    • P. Elias, "Interval and recency rank source coding: two on-line adaptive variable-length schemes", IEEE Transactions on Information Theory, vol. 33, pp. 3-10, Jan. 1987.
    • (1987) IEEE Transactions on Information Theory , vol.33 , pp. 3-10
    • Elias, P.1
  • 10
    • 84957901570 scopus 로고    scopus 로고
    • Steganalysis and game equilibria
    • D. Aucsmith, ed., Springer-Verlag,Lecture Notes in Computer Science
    • M. Ettinger, "Steganalysis and game equilibria", in Proc. 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1998.
    • (1998) Proc. 2nd Workshop on Information Hiding
    • Ettinger, M.1
  • 18
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • July, Oct
    • C. E. Shannon, "A mathematical theory of communication", Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, July, Oct. 1948.
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.E.1
  • 19
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • (D. Chaum, ed.), Plenum Press
    • G. J. Simmons, "The prisoners' problem and the subliminal channel", in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), pp. 51-67, Plenum Press, 1984.
    • (1984) Advances in Cryptology: Proceedings of Crypto 83 , pp. 51-67
    • Simmons, G.J.1
  • 21
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • (G. J. Simmons, ed.), IEEE Press
    • G. J. Simmons, "An introduction to shared secret and/or shared control schemes and their application", in Contemporary Cryptology: The Science of Information Integrity (G. J. Simmons, ed.), pp. 441-497, IEEE Press, 1991.
    • (1991) Contemporary Cryptology: The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 22
    • 84941434809 scopus 로고
    • Universal data compression and repetition times
    • Jan
    • F. M. Willems, "Universal data compression and repetition times", IEEE Transactions on Information Theory, vol. 35, pp. 54-58, Jan. 1989.
    • (1989) IEEE Transactions on Information Theory , vol.35 , pp. 54-58
    • Willems, F.M.1
  • 23
    • 0017493286 scopus 로고
    • A universal algorithm for sequential data compression
    • May
    • J. Ziv and A. Lempel, "A universal algorithm for sequential data compression", IEEE Transactions on Information Theory, vol. 23, pp. 337-343, May 1977.
    • (1977) IEEE Transactions on Information Theory , vol.23 , pp. 337-343
    • Ziv, J.1    Lempel, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.