159
click to vote
IH
15 years 11 months ago
2005 Springer
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
220
click to vote
IH
15 years 11 months ago
2005 Springer
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
151
click to vote
IH
15 years 11 months ago
2005 Springer
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
155
click to vote
IH
15 years 11 months ago
2005 Springer
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
|