IH
15 years 2 months ago
2005 Springer
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
117
click to vote
IH
15 years 2 months ago
2005 Springer
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
IH
15 years 2 months ago
2005 Springer 77
Voted
IH
15 years 2 months ago
2005 Springer
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
IH
15 years 2 months ago
2005 Springer
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
|