-
4
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, vol. 35, no. 3 & 4, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
6
-
-
0003453466
-
Principles and Practice of Information Theory
-
R. E. Blahut, Principles and Practice of Information Theory. Reading: Addison-Wesley, 1987.
-
(1987)
Reading: Addison-Wesley
-
-
Blahut, R.E.1
-
8
-
-
84947937393
-
A secure, robust watermark for multimedia", in Information Hiding
-
(R. Anderson, ed.)of, Springer
-
I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "A secure, robust watermark for multimedia", in Information Hiding (R. Anderson, ed.), vol. 1174 of Lecture Notes in Computer Science, Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
9
-
-
0023168253
-
Interval and recency rank source coding: Two on-line adaptive variable-length schemes
-
P. Elias, "Interval and recency rank source coding: two on-line adaptive variable-length schemes", IEEE Transactions on Information Theory, vol. 33, pp. 3-10, Jan. 1987.
-
(1987)
IEEE Transactions on Information Theory
, vol.33
, pp. 3-10
-
-
Elias, P.1
-
10
-
-
84957901570
-
Steganalysis and game equilibria
-
D. Aucsmith, ed., Springer-Verlag,Lecture Notes in Computer Science
-
M. Ettinger, "Steganalysis and game equilibria", in Proc. 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1998.
-
(1998)
Proc. 2nd Workshop on Information Hiding
-
-
Ettinger, M.1
-
11
-
-
0347909351
-
Contemporary cryptography: An introduction
-
(G. J. Simmons, ed.), ch. 1, IEEE Press
-
J. L. Massey, "Contemporary cryptography: An introduction", in Contemporary Cryptology: The Science of Information Integrity (G. J. Simmons, ed.), ch. 1, pp. 1 39, IEEE Press, 1991.
-
(1991)
Contemporary Cryptology: The Science of Information Integrity
, pp. 139
-
-
Massey, J.L.1
-
12
-
-
84957901571
-
A unified and generalized treatment of authentication theory
-
Springer
-
U. M. Maurer, "A unified and generalized treatment of authentication theory", in Proc. 13th Annual Symposium on Theoretical Aspects of Computer Science (STACS) (C. Puech and R. Reischuk, eds.), vol. 1046 of Lecture Notes in Computer Science, pp. 190-198, Springer, 1996.
-
(1996)
Proc. 13th Annual Symposium on Theoretical Aspects of Computer Science (STACS) (C. Puech and R. Reischuk, eds.), vol. 1046 of Lecture Notes in Computer Science
, pp. 190-198
-
-
Maurer, U.M.1
-
13
-
-
84957901572
-
Tracing traitors
-
M. Naor, A. Fiat, and B. Chor, "Tracing traitors", in Advances in Cryptology: CRYPTO '94 (Y. G. Desmedt, ed.), vol. 839 of Lecture Notes in Computer Science, 1994.
-
(1994)
Advances in Cryptology: CRYPTO '94 (Y. G. Desmedt, ed.), vol. 839 of Lecture Notes in Computer Science
-
-
Naor, M.1
Fiat, A.2
Chor, B.3
-
14
-
-
84926193517
-
Visual cryptography
-
Springer
-
M. Naor and A. Shamir, "Visual cryptography", in Advances in Cryptology: EU-ROCRYPT '94 (A. De Santis, ed.), vol. 950 of Lecture Notes in Computer Science, pp. 1-12, Springer, 1995.
-
(1995)
Advances in Cryptology: EU-ROCRYPT '94 (A. De Santis, ed.), vol. 950 of Lecture Notes in Computer Science
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
16
-
-
84947921515
-
Asymmetric fingerprinting
-
Springer
-
B. Pfitzmann and M. Schunter, "Asymmetric fingerprinting", in Advances in Cryptology: EUROCRYPT '96 (U. Maurer, ed.), vol. 1233 of Lecture Notes in Computer Science, Springer, 1996.
-
(1996)
Advances in Cryptology: EUROCRYPT '96 (U. Maurer, ed.), vol. 1233 of Lecture Notes in Computer Science
-
-
Pfitzmann, B.1
Schunter, M.2
-
17
-
-
84957353052
-
Anonymous fingerprinting
-
Springer
-
B. Pfitzmann and M. Waidner, "Anonymous fingerprinting", in Advances in Cryptology: EUROCRYPT '97 (W. Fumy, ed.), vol. 1070 of Lecture Notes in Computer Science, Springer, 1997.
-
(1997)
Advances in Cryptology: EUROCRYPT '97 (W. Fumy, ed.), vol. 1070 of Lecture Notes in Computer Science
-
-
Pfitzmann, B.1
Waidner, M.2
-
18
-
-
84940644968
-
A mathematical theory of communication
-
July, Oct
-
C. E. Shannon, "A mathematical theory of communication", Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, July, Oct. 1948.
-
(1948)
Bell System Technical Journal
, vol.27
-
-
Shannon, C.E.1
-
19
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
(D. Chaum, ed.), Plenum Press
-
G. J. Simmons, "The prisoners' problem and the subliminal channel", in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), pp. 51-67, Plenum Press, 1984.
-
(1984)
Advances in Cryptology: Proceedings of Crypto 83
, pp. 51-67
-
-
Simmons, G.J.1
-
21
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
(G. J. Simmons, ed.), IEEE Press
-
G. J. Simmons, "An introduction to shared secret and/or shared control schemes and their application", in Contemporary Cryptology: The Science of Information Integrity (G. J. Simmons, ed.), pp. 441-497, IEEE Press, 1991.
-
(1991)
Contemporary Cryptology: The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
22
-
-
84941434809
-
Universal data compression and repetition times
-
Jan
-
F. M. Willems, "Universal data compression and repetition times", IEEE Transactions on Information Theory, vol. 35, pp. 54-58, Jan. 1989.
-
(1989)
IEEE Transactions on Information Theory
, vol.35
, pp. 54-58
-
-
Willems, F.M.1
-
23
-
-
0017493286
-
A universal algorithm for sequential data compression
-
May
-
J. Ziv and A. Lempel, "A universal algorithm for sequential data compression", IEEE Transactions on Information Theory, vol. 23, pp. 337-343, May 1977.
-
(1977)
IEEE Transactions on Information Theory
, vol.23
, pp. 337-343
-
-
Ziv, J.1
Lempel, A.2
-
24
-
-
84957886335
-
Modeling the security of steganographic systems
-
Springer-Verlag
-
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, F. Wicke, and G. Wolf, "Modeling the security of steganographic systems", in Proc. 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1998.
-
(1998)
Proc. 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, F.7
Wolf, G.8
|